Spectrally Efficient Bidirectional Decode-and-Forward Relaying for Wireless Networks

von Diplom-Ingenieur Tobias Josef Oechtering aus Rheine

von der Fakultät IV - Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften – Dr.-Ing. –

genehmigte Dissertation

Promotionsausschuss Vorsitzender: Prof. Dr.-Ing. habil. Gerhard Mönich 1. Berichter: Prof. Dr.-Ing. Dr. rer. nat. Holger Boche, 2. Berichter: Prof. Dr.-Ing. Dr.-Ing. E. h. Joachim Hagenauer Tag der wissenschaftlichen Aussprache: 09.10.2007

Berlin, 2007 D83 ii

Zusammenfassung

Relaiskonzepte werden in Zunkuft in drahtlosen Netzwerken eine zentrale Rolle spielen. In dieser Dissertation wird ein Netzwerk mit drei Stationen betrachtet, in welchem zwei Stationen mittels einer Relaisstation miteinander kommunizieren. Wir untersuchen ein Zweiphasenprotokoll ohne Rückkopplung, in dem die Relaisstation die Nachrichten für beide Richtungen gleichzeitig dekodiert und weiterleitet. Damit kann der spektrale Ver- lust, verursacht durch halbduplexe Stationen in unidirektionalen Protokollen, kompensiert werden. Im ersten Abschnitt geht es um schichtübergreifende Konzepte für die bidirektionale Re- laiskommunikation basierend auf dem Prinzip der Superpositionskodierung. Die Betrach- tungen werden für die festgelegte und optimale Zeitaufteilung der Phasen durchgeführt. Eine ausführliche Untersuchung der Kombinatorik der erreichbaren Ratenregion für Stationen mit einer Antenne erlaubt es uns die Ratenpaare, bei denen die Summe der gewichteten Raten maximiert wird, explizit zu bestimmen. Diese Untersuchungen werden am Beispiel der pa- ritätischen und der optimalen Zeitaufteilung ausgeführt. Die optimalen Ratenpaare werden im Weiteren für den Entwurf einer durchsatzoptimalen Ressourcenallokationsstrategie und für ein Relaisauswahlkriterium in einem Netzwerk mit N Relaisstationen verwendet. Dabei ist es vorteilhaft, die abwechselnde Nutzung ver- schiedener Relaisstationen zu erlauben. Außerdem stellen wir fest, dass die Summe eines jeden Ratenpaares auf dem Rand der ergodischen Ratenregion für unabhängige und identisch rayleighverteilte Schwundkanäle asymptotisch mit log(log(N)) wächst. Als nächstes betrachten wir den Fall, dass die Relaisstation eine Nachricht zusätzlich zur bidirektionalen Relaiskommunikation an beide Stationen übeträgt. Es zeigt sich, dass es immer optimal ist die Relaisnachricht zuerst zu dekodieren. Die gemeinsame Ressourcenal- lokation verbessert die Gesamteffizienz und ermöglicht einen neuen Ratenabtausch. Darüber hinaus charakterisieren und diskutieren wir das gemeinsame Summenratenmaximum beider Routingaufgaben. Anschließend untersuchen wir die erreichbaren Ratenregionen der bidirektionalen Re- laiskommunikation zwischen Stationen mit mehreren Antennen. Wir spezifizieren die op- timale Sendestrategie und zeigen, dass die Summe eines jeden Ratenpaares auf dem Rand der erreichbaren Ratenregion linear gemäß der räumlichen Dimension des Vektorkanals und der Zeitaufteilung der Phasen ansteigt.

iv Zusammenfassung

Im zweiten Abschnitt beweisen wir eine optimale Kanalkodierungsstrategie für den bidirek- tionalen Broadcastkanal mit einem endlichen Alphabet. Dabei werden erreichbare Raten bezüglich der maximalen Fehlerwahrscheinlichkeit betrachtet. Beim Kodierungssatz folgen wir der Philosophie der Netzwerkkodierung, die besagt, dass sich Informationsflüsse nicht wie Flüssigkeiten verhalten. Im abschließenden Resümee geben wir einen Ausblick auf zukünftige Forschungsarbeiten und präsentieren Beispiele wie bidirektionale Relaiskommunikation in drahtlose Netzwerke integriert werden kann.

v Abstract

Relaying concepts will play a central role in future wireless networks. In this thesis we consider a three-node network where two nodes communicate with each other by the support of a relay node. We study a two-phase decode-and-forward bidirectional relaying protocol without feedback. Bidirectional relaying has the ability to compensate the spectral loss due to the half-duplex constraint of nodes in wireless communications. In the first part we study cross-layer design aspects of bidirectional relaying using super- position encoding at the relay node. For the two phases we consider the fixed and optimal time division case. For single-antenna nodes an intensive study of the combinatorial struc- ture of the achievable rate region allows us to characterize the rate pairs which maximize the weighted rate sum for the equal and fixed time division case in closed form. These are used for the design of a throughput optimal resource allocation policy based on the backpressure strategy and to derive a relay selection criterion for routing in network with N relay nodes. It shows that it is beneficial to allow time-sharing between the usage of relay nodes. We see that the sum of any rate pair on the boundary of the ergodic rate region for independent and identical distributed Rayleigh fading channels grows asymptotically with log(log(N)). Then we add a relay multicast to the bidirectional relay communication. The joint resource allocation of two routing tasks improves the overall efficiency and enables new rate trade- offs. It shows that it is always optimal to decode the relay message first. Furthermore, we characterize and discuss the total sum-rate maximum of both routing tasks. After that we study the achievable rate region of bidirectional relaying between nodes equipped with multiple antennas. Therefore, we specify the optimal transmit strategy and show that the achievable rate region scales linearly with respect to the spatial degrees of the vector channels and time division. In the second part we find an optimal channel coding strategy for the bidirectional broadcast channel considering finite size alphabets. Thereby, we consider achievable rates with respect to the maximal probability of error. For the coding theorem we follow the philosophy of network coding and regard information flows not as “fluids”. In the final conclusion we give an outlook on future research work and show how the bidi- rectional relaying protocol can be integrated in wireless networks.

vi Contents

1 Introduction 1 1.1 Trends and Motivations – Related Literature ...... 1 1.2 Contribution and Outline of the Thesis ...... 10

2 Bidirectional Relay Communication using Superposition Encoding 15 2.1 Introduction...... 15 2.2 Achievable Rate Region ...... 18 2.2.1 GaussianChannel...... 18 2.2.2 Multiple Access Phase ...... 21 2.2.3 BroadcastPhase ...... 23 2.2.4 Bidirectional Achievable Rate Region ...... 26 2.2.5 Achievable Rate Regions with Power Scaling ...... 42 2.3 Throughput Optimal Resource Allocation ...... 51 2.3.1 Stability Region ...... 53 2.3.2 Numerical Simulation ...... 58 2.4 RelaySelection ...... 61 2.4.1 Relay Selection Criterion ...... 63 2.4.2 Scaling Law of the Ergodic Rate Region ...... 67 2.5 Piggyback a Common Relay Message ...... 75 2.5.1 Broadcast Phase with Relay Multicast ...... 78 2.5.2 Total Sum-Rate Maximum ...... 80 2.5.3 Combinatorial Discussion and Working Examples ...... 85 2.6 Extension to Multi-Antenna Bidirectional Relaying ...... 103 2.6.1 MIMO Multiple Access Phase ...... 107 2.6.2 MIMOBroadcastPhase ...... 112 2.6.3 MIMO Bidirectional Achievable Rate Region ...... 117 2.7 Discussion...... 120 2.8 Appendix:Proofs ...... 125

vii Contents

3 Optimal Coding Strategy for the Bidirectional Broadcast Channel 181 3.1 Introduction...... 181 3.1.1 Two-Phase Bidirectional Relay Channel ...... 182 3.1.2 Capacity Region of the Multiple Access Phase ...... 184 3.2 Capacity Region of the Broadcast Phase ...... 184 3.2.1 Proof of Achievability ...... 186 3.2.2 Proofofweakconverse...... 192 3.2.3 Cardinality of set ...... 194 U 3.3 Achievable Bidirectional Rate Region ...... 195 3.4 Example with Binary Channels ...... 196 3.5 Discussion and Further Results ...... 198

4 Conclusion and Future Work 201

References 207

viii List of Figures

2.1 Bidirectional relaying between single-antenna nodes ...... 15 2.2 Bidirectional achievable rate regions ...... 28 2.3 Contour plot of sum-rate maximum ...... 35 2.4 Equivalent characterization of ...... 39 RBRopt 2.5 Weighted rate sum optimal rate pairs ...... 41 2.6 Achievable rate region ˜ (with scaled powers) ...... 50 RBRopt 2.7 Queueingmodel...... 52 2.8 Rate and stability regions of different policies ...... 59 2.9 Queue length evolutions of different policies ...... 60 2.10 Achievable rate region of relay selection with time-sharing ...... 66 2.11 Growth of the ergodic rate region with relay selection ...... 72 2.12 Upper and lower bounds on scaling law ...... 73 ⋆ 2.13 Cases where RBC(γR) intersects the boundary of the MAC capacity region 86 2.14 Rate trade-offs for constant total sum-rate ...... 90 2.15 Characteristic angles of α and (1 α) ...... 95 CMAC − RBC 2.16 Total sum-rate optimal rate pairs with respect to the time division ...... 98 2.17 Total sum-rate maximum with respect to the time division ...... 101 2.18 Piggyback achievable rate region for equal time division ...... 102 2.19 Piggyback achievable rate region for optimal time division ...... 102 2.20 Bidirectional relaying between multiple antenna nodes ...... 103 2.21 MIMO achievable rate region ...... 118 2.22 Combinatorial discussion for the proof of Theorem 2.5 ...... 127 2.23 Combinatorial discussion for the proof of Lemma 2.46 ...... 170

3.1 Two-phase decode-and-forward bidirectional relay channel without feedback 183 3.2 Achievable rate regions for binary symmetric channels ...... 198

4.1 Cellular coverage extension using bidirectional relaying ...... 202 4.2 Multi-hop communication using bidirectional relaying ...... 202 4.3 Coding principle of bidirectional relaying can improve cellular downlink . . 204

ix Abbreviations, Notation, and Symbols

Abbreviations

AWGN additional white Gaussian noise iid independent and identical distributed pdf probability density function cdf cumulative distribution function eq equal time division opt optimal time division MAC multiple access channel BC broadcast channel BR bidirectional relaying SISO single-input single-output MIMO multiple-input multiple-output TDMA time division multiple access FDMA frequency-division multiple access CDMA code-division multiple access RS relay selection RSTS relay selection with time-sharing between usage of relay nodes

Notation

Æ set of all natural numbers 1, 2, 3,... { }

Ê set of real numbers

Ê+ set of non-negative real numbers

C set of complex numbers [a, b] closed interval of real numbers where endpoints a to b are included (a, b) open interval of real numbers where endpoints a to b are not included [a, b), (a, b] half-closed intervals of real number where either a or b is included lhs := rhs the value of the right hand side (rhs) is assigned to the left hand side (lhs) lhs =: rhs the value of the left hand side (lhs) is assigned to the right hand side (rhs)

n Ê α scaled set α := αR : R with α Ê and set R R { ∈ R} ∈ R⊂ x Abbreviations, Notation, and Symbols

f : function f from domain to codomain D → C D C x f(x) mapping of x to f(x) 7→ co( ) convex hull of set A A cl( ) closure of set A A int( ) interior of set A A cardinality of set |A| A x there exists an element x in set ∃ ∈A empty set A ∅ ½E characteristic function which is 1 if event E is true and 0 else [x]+ abbreviation for max(0,x) log logarithm to the base two ln natural logarithm exp exponential function , logical conjunction (AND), logical disjunction (OR) ∧ N∨ N n=1, n=1 numerated logical conjunctions and disjunctions x 1 L1-norm of vector x V|| || W HH , HT hermitian resp. transpose of the matrix or vector H rank(H) rank of the matrix H tr(H), det(H) trace and determinant of the matrix H I identity matrix where the dimension follows from the context diag(a1,a2,...,an) diagonal matrix with diagonal elements a1,a2,...,an |z−m|2 2 1 − X (m, σ ) X is complex Gaussian distributed with pdf f (x)= e σ2 ∼ CN X πσ2

E X expectation of the random variable X { }

È E probability of event E { } X time-average of random process X f(n) f(n) Θ(g(n)) f(n) is big-theta of g(n) if 0 < lim inf g(n) lim sup g(n) < . n→∞ ≤ n→∞ ∞ o g(x) f(x) is small-o of g(x) if lim g(x) = 0. x→∞ f(x) 

Symbols

In Chapter 2 we use boldface letters to denote vectors and matrices and calligraphic letters n denote sets. In Chapter 3 we use the information theoretic typical notation where X1 denotes the sequence X11, X12,...,X1n. We often choose a generic notation for the symbols which gets at some point quite extensive. The index k enumerates the nodes 1,2, and R respectively, while the index n enumerates the relay nodes in Section 2.4. The superscripts and ⋆ are ∗ used for optimal values. The subscripts eq or opt specify the corresponding rate, rate pair, or rate region for the equal or optimal time division case. The following tables list the most important symbols.

xi Abbreviations, Notation, and Symbols

P mean power constraint at node k 1, 2, R k ∈ { } σ2 variance of Gaussian noise 2 γk signal-to-noise ratio Pk/σ h1 flat fading SISO channel coefficient between node 1 and the relay node th h1,n flat fading SISO channel coefficient between node 1 and the n relay node h2 flat fading SISO channel coefficient between node 2 and the relay node th h2,n flat fading SISO channel coefficient between node 2 and the n relay node H1 flat fading MIMO channel matrix between node 1 and the relay node H2 flat fading MIMO channel matrix between node 2 and the relay node α fraction of time in the MAC phase, i.e. fraction 1 α of the time in BC phase − α∗ optimal α to support a certain rate pair in MAC phase set of feasible power distribution vectors [β ,β ] B 1 2 β1 proportion of PR spend for forwarding message m1 to node 2 β2 proportion of PR spend for forwarding message m2 to node 1 β relay power distribution with β = β and β = 1 β 1 2 − β∗ optimal β to support a certain rate pair in MAC phase β⋆ optimal relay power distribution, cf. Proposition 2.2 min γR minimal necessary γR to support a certain rate pair in MAC in the BC phase MAC C γR minimal necessary γR to support any rate pair in MAC in the BC phase ΣMAC C MAC γR minimal necessary γR to support a rate pair [R1, R2] Σ in the BC phase † ∈ R γR characteristic signal-to-noise ratio for the broadcast phase, cf. Corollary 2.8 γΣ1 minimal necessary γ to support the vertex ν in the BC phase R R Σ1 ∈ CMAC γ2Σ minimal necessary γ to support the vertex ν in the BC phase R R 2Σ ∈ CMAC γˆ characteristic signal-to-noise ratio γR, cf. Lemma 2.46 ν vertex between −→ and MAC of multiple access rate region, cf. (2.5a) Σ1 R1R RΣ ν vertex between −→ and MAC of multiple access rate region, cf. (2.5b) 2Σ R2R RΣ R1 achievable rate form node 1 via relay node to node 2 R2 achievable rate from node 2 via relay node to node 1 RΣ bidirectional sum-rate R1 + R2 = RΣ RR additional relay multicast rate max RR maximal achievable additional relay rate RR R† characteristic rate, cf. Lemma 2.46 Rtot total sum-rate Rtot = R1 + R2 + RR R∗ total sum-rate maximum of piggyback rate region tot RPiggy −→ individual rate constraint from node 1 to the relay node in MAC phase R1R −→ −→ for the th relay node R1R,n R1R n −→ individual rate constraint from node 1 to the relay node in MAC phase R2R −→ −→ for the th relay node R2R,n R2R n MAC RΣ sum-rate constraint of node 1 and 2 to the relay node in the MAC phase MAC MAC th RΣ,n RΣ for the n relay node

xii Abbreviations, Notation, and Symbols

2Σ R1 maximal achievable rate R1 at vertex ν2Σ, cf. (2.5b) Σ1 R2 maximal achievable rate R2 at vertex νΣ1, cf. (2.5a) −→ individual rate constraint from the relay node to node 2 in BC phase RR1 −→ −→ for the th relay node RR1,n RR1 n −→ individual rate constraint from the relay node to node 2 in BC phase RR2 −→ −→ for the th relay node RR2,n RR2 n ∗ MIMO R−→ maximal unidirectional rate R1 achievable in , cf. (2.6.1) 1R MAC ∗ CMIMO R−→ maximal unidirectional rate R2 achievable in 2R MAC ⋆ C R−→ sum-rate optimal rate R1 in BC phase, cf. Proposition 2.2 R1 ⋆ R−→ sum-rate optimal rate R2 in BC phase, cf. Proposition 2.2 R2 opt R1 total sum-rate optimal rate R1, cf. Theorem (2.48) opt R2 total sum-rate optimal rate R2, cf. Theorem (2.48) Rx proportion of rate R1 interchanged for relay rate RR, cf. Corollary 2.49 Ry proportion of rate R2 interchanged for relay rate RR, cf. Corollary 2.49 ⋆ R1 BC sum-rate optimal rate R1, cf. Proposition 2.47 ⋆ R2 BC sum-rate optimal rate R2, cf. Proposition 2.47 BC RΣ sum-rate maximum of broadcast phase, cf. Proposition 2.2 RΣ bidirectional sum-rate optimal rate pair, cf. Corollary 2.8 R rate pair of parametrized boundary of BC RBC Ropt rate pair of parametrized boundary of BRopt, cf. Corollary 2.15 ⋆ R RBC BC sum-rate optimal rate pair, cf. Proposition 2.47 MIMO MIMO RMAC weighted rate sum optimal rate pair of MAC , cf. (2.75) MIMO C MIMO RBC weighted rate sum optimal rate pair of BC , cf. (2.79) ∗ R 1 Req weighted rate sum optimal rate pair for α = /2, cf. Theorem 2.10 ∗ ∗ th Req,n Req for the n relay node ∗ Ropt weighted rate sum optimal rate pair of BRopt, cf. Theorem 2.16 ∗ ∗ th R Ropt,n Ropt for the n relay node ∗ R1eq maximal unidirectional rate R1 achievable in BReq, cf. (2.22a) ∗ ∗ th R R1eq,n R1eq for the n relay node ∗ R2eq maximal unidirectional rate R2 achievable in BRopt, cf. (2.22b) ∗ ∗ th R R2eq,n R2eq for the n relay node ∗ Rkeq maximal unidirectional rate Rk, k = 1, 2, achievable in BReq ∗ ∗ th R Rkeq,n Rkeq for the n relay node ∗ Rkopt maximal unidirectional rate Rk, k = 1, 2, achievable in BRopt ∗ ∗ th R Rkopt,n Rkopt for the n relay node R∗ maximal unidirectional rate R , k = 1, 2, achievable in kRSeq k RRSTSeq R∗ maximal unidirectional rate R , k = 1, 2, achievable in kRSopt k RRSTSopt R∗ maximal unidirectional ergodic rate R , k = 1, 2 achievable in kRSeq k RRSTSeq R∗ maximal unidirectional ergodic rate R , k = 1, 2 achievable in kRSopt k RRSTSopt

xiii Abbreviations, Notation, and Symbols

capacity region in the BC phase CBC capacity region in the MAC phase CMAC capacity region of the nth relay node in the MAC phase CMAC,n MIMO capacity region of MIMO MAC CMAC −→ set of rate pairs in with R = R−→ R1R CMAC 1 1R −→ set of rate pairs in with R = R−→ R2R CMAC 2 2R MAC set of rate pairs in with R + R = RMAC RΣ CMAC 1 2 Σ BC achievable rate region in the BC phase RMIMO achievable rate region of MIMO BC RBC achievable rate region of the nth relay node in the BC phase RBC,n set of transformed rate pairs for rate constraint R−→, Theorem 2.12 R1 1R set of transformed rate pairs for rate constraint −→, Theorem 2.12 2 R2R R MAC Σ set of transformed rate pairs for rate constraint RΣ , Theorem 2.12 R bidirectional achievable rate region RBR MIMO MIMO bidirectional achievable rate region RBR BR ergodic bidirectional rate region R bidirectional achievable rate region with equal time division RBReq achievable with the nth relay node RBReq,n RBReq BRopt bidirectional achievable rate region with optimal time division R th BRopt,n BRopt achievable with the n relay node RMIMO MIMOR bidirectional achievable rate region with optimal time division RBRopt achievable rate region with relay selection for equal time division RRSeq RSopt achievable rate region with relay selection for optimal time division R with time-sharing between the usage of relay nodes RRSTSeq RRSeq with time-sharing between the usage of relay nodes RRSTSopt RRSopt ergodic achievable rate region of RRSTSeq RRSTSeq RSTSopt ergodic achievable rate region of RSTSopt R achievable rate region with additionalR relay multicast RPiggy

xiv 1 Introduction

1.1 Trends and Motivations – Related Literature

Most of these days phenomenal technological advances base beside others on the continuous progress in integrated circuit design which is described by the popular Moore’s law. In 1965 Moore [Moo65] observed that with continuous decreasing packages size the relative manufacturing cost per component exponentially decreases while additionally the number of components per integrated circuit exponentially increases. This trend has been observed until now which has made the development of portable computation and communication devices with an affordable price possible. With this we have an ever-growing number of wireless applications and users – the technological vision of the WWRF1 expects “7 trillion wireless devices serving 7 billion people by 2017”.

The broad consumer wireless telecommunications started with generations of cellular voice networks with a rapidly increasing number of subscribers at the turn of the millennium. With a growing demand for new high data services such as mobile Internet with video appli- cations or interactive gaming the development of latest generations show a shift to cellular data networks which also support the voice application. However, the network bandwidth in favorable frequency bands is finite since the nowadays technically usable low frequencies are limited. Future systems will operate at higher frequencies, but there the wireless com- munication is more susceptible to radio propagation conditions. This will even worsen the coverage problem service providers already have. Obviously, the providers are interested to offer satisfactory services anywhere at any time, which is an engineering challenge es- pecially where the direct link does not have the desired quality, e.g. due to shadowing or distance. In a single point-to-point connection one could simply increase the transmit power, which results in a higher interference level in the network and a higher energy consumption. Both is unattractive, because a lower interference level often allows to accommodate more users in the network and a reduced energy consumption results either in a longer battery life or a smaller battery size, which is a crucial point for miniaturization. As a consequence in traditional cellular network architectures the provider can only install more base-stations to cover the whole area, but a higher density of base-stations leads to a notable increase in

1WWRF-Wireless World Research Forum - http://www.wireless-world-initiative.org

1 1 Introduction infrastructure costs. Katz discusses in [Kat94] many fundamental design issues of wireless networks at that time which are still important these days.

On the other hand, wireless networks without any wired infrastructure are called ad hoc net- works. Such networks utilize the broadcast nature of the wireless channel so that in principle any node can communicate to any other. But due to the attenuation of a wireless channel a reliable transmission is typically only possible to some neighboring nodes. Therefore, for a successful transmission to a node that is not in its vicinity the nodes need to cooperate to forward each others information, which is called a multi-hop communication. Ad hoc net- works have some appealing properties because of this relay communication technique. First, we see that any additional node added to the network increases the overall connectivity. Fur- ther, if a node disappears due to bad channel conditions or power supply insufficiency other nodes in its vicinity have the possibility to take over its routing responsibilities. This node redundancy and its adaptability makes ad hoc networks highly robust. And since we do not require a wired backbone, it is said that an ad hoc network is easily deployed. It follows that there are many applications where an ad hoc topology is more appropriate than cellular topology, e.g. sensor networks, home environments, or networks of automobiles.

Accordingly, the integration of multi-hop capability in traditional cellular systems has the potential to improve the connectivity by closing internal gaps of a cell without installing more base-stations. It could be also used as a “last mile” technology to extend the periphery of a wireless cell. Thereby, the relay nodes may be mobile or fixed, but they do not have access to the wired backbone network of the base-stations or access points. Theoretical and measurement based radio propagation models indicate that the average received signal power typically falls off with the n-th power of the distance between transmitter and receiver with a path-loss coefficient n between 2 (free space) and 6 (obstructed in building) [Rap96, Table 4.2]. Since multi-hop transmission splits a long distance into several shorter distances, it follows that the cumulative path loss is lower than the path loss of the direct transmission. This leads to an additional reduction in power and therefore energy consumption and/or a lower power level throughout the network.

That multi-hop or relay strategies are promising technological advancements of future wire- less networks indicate for instance that for all network sizes there are IEEE 802 LAN/MAN standardization working groups2 which are focused on the developing of mesh-enabled stan- dards:

• For wireless personal area networks (WPAN) by the Task Group 5 of IEEE 802.15 standard.

• For wireless local area networks (WLAN) in the extension IEEE 802.11s.

2The IEEE 802 LAN/MAN Standards Committee develops Local Area Network standards and Metropolitan Area Network standards. http://grouper.ieee.org/groups/802/

2 1.1 Trends and Motivations – Related Literature

• For wireless metropolitan area networks (WMAN) in the amendment IEEE 802.16j – mobile multi-hop relay. Thereby, one allows every subscriber station to function as a backhaul, forwarding traffic until it finally arrives at the intended destination.

• Such meshed network principles will be indispensable for a future wireless network, which should realize broadband wireless access across the country (Mobile Broadband Wireless Access) and should be someday specified in a IEEE 802.20 standard.

These standardizations are guided by industrial player forums like WiMAX for WMAN, Wi-Fi for WLAN, ZigBee for low data rate WPAN which try to promote conformance and interoperability of the devices. In addition to this, many companies are developing various proprietary mesh network solutions. It is expected that relaying strategies should close the gap between WLAN-type and cellular systems. For more details we refer to [LZKS06].

For the design and development of communication networks engineers successfully used the concept of layered architecture to split the enormous complexity of modern communica- tion networks communication. This allows the separate design of a protocol for each layer. Among them the ISO-OSI3 reference model is still the most prominent. The IEEE 802 stan- dards for wireless networks specify the two lower layers. However, an efficient design of a multi-hop communication represents such a significant technical challenge that a cross-layer design is imperative. This can be seen by a brief inspection of the three (media) layers at the bottom of the stack. The Physical Layer is concerned with signal transmission aspects. The Data Link Layer is concerned with the transfers of data between nodes. In IEEE 802.16, the Data Link Layer is divided in a Logical Link Control Sublayer and Media Access Control Sublayer. The Logical Link Control is concerned with the flow control, which means that it multiplexes the service provided to the higher layer and is responsible for acknowledg- ment and error recovery. The Media Access Control provides addressing and channel access control mechanisms which means that it is responsible for the spectral resource allocation. The Network Layer is responsible for the end-to-end transmission, which means that it is responsible for routing the data from the source to the destination. Obviously, for an effi- cient resource allocation for a multi-hop communication we have to route our messages via nodes which have sufficient good channels. Otherwise, if higher layers fix the route, on the Physical Layer the nodes may be coerced to use higher transmit powers to offer the desired service to the Data Link Layer. This causes a higher energy consumption and a higher inter- ference for other nodes which will make the medium access inefficient as well. Therefore, for an efficient future wireless system a cross-layer design with an adaptive power control and resource allocation will be necessary. A more detailed discussion about these motivat- ing thoughts about adaptive power control, energy efficient cross-layer design aspects, and

3Open System Interconnection (OSI) protocol stack, which was developed as a reference model by the Inter- national Standards Organizations (ISO)[Zim80]. From top to bottom the ISO-OSI reference model defines seven layers in a stack: Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, and Physical Layer.

3 1 Introduction efficient methods of allocating network resources can be found in [Bam98], [GW02], and [SRK03].

Wireless Communication: Cooperative Diversity

Wireless communications deals with the problem of reliable transmission of information despite of impairments introduced by the wireless transmission. Propagation impairments are usually collected in a time-varying fading channel model that collects phenomena like multi-path, Doppler-shift, path-loss, and shadowing. Additionally, noise and interference limit the communication. Diversity techniques reduce the probability that a transmission fails due to a channel which is in a deep fade. We distinguish between time, frequency, and spatial diversity according to the dimension where the robustness against fading is realized. In a cellular network other users may receive the signal from the communication between a user and a base-station due to the broadcast nature of the wireless channel. Then we will gain spatial diversity if such a user additionally forwards the signal over an independent path to the destination. In [SEA98] and [SEA03a, SEA03b] Sendonaris, Erkip, and Aazhang introduced this concept where two users benefit by relaying their signals for each other and called it user cooperative diversity. Basically, the diversity gain is achieved by implementing an additional multi-hop communication. The contribution [LTW01, LTW04] of Laneman, Tse, and Wornell is the next influential work in the context of cooperative diversity in wireless networks. They studied the out- age behavior of several cooperative diversity protocols named according to the cooperative processing strategy: decode-and-forward, amplify-and-forward, selection, and incremental relaying. It shows that except for the decode-and-forward strategy all strategies achieve the full diversity order in the high SNR regime. Thereby, the reduced diversity order for the decode-and-forward protocol is caused by the definition of the outage event. In a subsequent work [LW03] Laneman and Wornell proposed distributed space-time codes, which also can achieve the full spatial diversity given by the number of cooperating terminals. Those works have sparked a growing interest in the design and analysis of cooperative and therefore relay transmission protocols. Most of them focused on incorporation of vari- ous types of channel codes, so called coded cooperation, e.g. [HZF04], [HN06], [SE04], [LSS03], and [MMYZ06] to mention only a few. [NHH04] and [SHMX06] provide more elaborate introductions. Nearly all cooperative protocols assume half-duplex nodes, which means that a node cannot transmit and receive at the same time using the same frequency. This is due to the fact that in wireless communications it is technically difficult and often impossible to isolate sufficiently the received signal from the transmit signal where the transmitter and receiver of the node use the same bandwidth at the same time. For that reason the protocols require a medium access

4 1.1 Trends and Motivations – Related Literature strategy in time or frequency domain which allocates exclusive resources for the reception of the cooperative user signal and the transmission of its own and cooperative users signals, which can be seen as time or frequency division duplex at the relay node. Accordingly, Laneman et al. point out that for the benefits from user cooperative diversity we have a loss in spectral efficiency due to half-duplex operation, which makes a diversity-vs-multiplexing trade-off discussion necessary [LTW04, AGS05, YE06]. This concept was introduced by Zheng and Tse in [ZT03] for wireless communication of nodes with multiple antennas and can be applied if one considers the cooperative users as a distributed multi-antenna system.

The basic idea behind cooperative/multi-hop communication is that a cooperative node relays the signal or message. Accordingly, to find the optimal respectively a good cooperative strategy we should look at the results of on the relay channel.

Information Theory: Relay Channel

Shannon stated the channel capacity theorem in 1948 in his seminal work “A Mathematical Theory of Communication” [Sha48], which is usually seen as the birth of information the- ory. In 1961 Shannon introduced in [Sha61] the two-way channel where two nodes want to communicate as effectively as possible with each other. Therein, he obtained the capacity region for the average error for the restricted two-way channel, this means that a feedback between the encoders of the two nodes is not allowed. Nowadays this work is regarded as the first work on multi-user information theory. Compared to the knowledge of the single-user case we are still in the beginning of understanding multi-user information theory.

Recently, the relay channel is experiencing a revival because multi-hop communication for meshed network architectures has the potential for a substantial coverage extension. The relay channel problem was introduced by van der Meulen in [vdM71] in the early seventies. A few years later, Cover and El Gamal established in [CG79] the capacities when the channel is degraded, reversely degraded and when feedback is added from both receivers to the sender and relay node. For the general relay channel they derived an upper bound to the capacity and an achievable rate. Later, in [GA82] the capacity of the semideterminitic relay channel, where the output of the relay is a deterministic function of the input of both senders, is found. However, the capacity of the general relay channel is still unknown.

Since then one tried to get closer by the study of channel models with a simplifying assump- tion. Zhang derived in [Zha88] a converse for a relay channel where he assumed a noiseless channel with a certain rate between the relay and the destination. Cover and Kim showed in [CK06] that this upper bound is actually achievable using alternatively a novel “hash-and- forward” or “compress-and-forward” strategy. In [GH05] El Gamal and Hassanpour study another simplified relay channel where the transmitted relay symbols are allowed to depend additionally on the non-causally present received symbol. It shows that with “instantaneous

5 1 Introduction relaying” in a Gaussian channel an amplify-and-forward strategy achieves the cut-set bound under certain conditions.

Nonetheless, for the lower bound Cover and El Gamal established in [CG79] a coding strat- egy which gives us an achievable rate. An equivalent but more regular coding scheme was found by Williams in [Wil82]. Then in [SG00, GK03, XK04] the authors extend these results to the multiple relay channel. Thereby, in [XK04] an even more practical coding strategy is presented. In [KGG05] Kramer, Gastpar, and Gupta extend many cooperative strategies to relay networks with many terminals, antennas, and sources and compare the performances of the strategies under wireless communication aspects.

All works on the relay channel we considered so far assume full-duplex nodes. El Gamal noted4 that nobody had wireless relay networks in mind when they started working on the relay channel. Accordingly, in the last years some work on the relay channel is done which considers wireless communication aspects. Firstly, in [KSA03] Khojastepour, Sabharwal, and Aazhang transfered some results in a straightforward manner to the relay channel with half-duplex nodes, which they called cheap relay nodes. They separate the transmission and reception at the relay node in the time domain. Then El Gamal and Zahedi establish in [GZ05] the capacity of the relay channels with orthogonal channels in the frequency domain from the sender to the relay and from the sender and relay to the destination. In [LLG06] Lai, Liu, and El Gamal consider cooperation strategies for a three-node wireless network. In particular they propose a cooperation strategy for the relay channel with a noisy feedback combining the decode-and-forward and compress-and-forward strategy.

In [DK04] Dawy and Kamoun determine relay regions where it is beneficial to use a relay node. Therefore, they compare the power allocation for a multi-hop transmission with and without cooperation as well as a single-hop transmission where the channel model includes the path loss between nodes. Liang and Veeravalli derive in [LV05] the optimal distribu- tion of the orthogonal resources in frequency domain in a Gaussian relay channel. Finally, in [HMZ05] Host-Madsen and Zhang study the ergodic capacity of the relay channel in a Rayleigh distributed fading environment. All authors recognized that in the case of half- duplex nodes we need to allocate additional resources in time or frequency. This means that the relay communication is only spectrally more efficient than the direct communication if the spectral gain using the relay node compensates the “costs” of the additional resource allocation.

4El Gamal noted this at his talk on the MSRI Workshop: Mathematics of Relaying and Cooperation in Com- munication Networks, University of California, Berkeley, April 2006.

6 1.1 Trends and Motivations – Related Literature

Bidirectional Relaying and Network Coding

Cooperative protocols establish a separate route to realize diversity. Therefore, the cooper- ating users have to split their resources which results in a loss in spectral efficiency. From the half-duplex relay channel we know that this is only spectrally more efficient if the re- lay route results in a sufficient large spectral gain. For instance in [SE05] we can find an example in the context of cooperative space-time codes where a user with a sufficient weak channel can even worsen the performance of the other user. Thereby, they even did not take into account the extra allocated spectral resource for the cooperative protocol. Accordingly, for a user with a good direct link it is inefficient to cooperate with a user which has a weak direct link. On the other hand the user with the weak direct channel benefits a lot from co- operation. It follows that in coverage problems only one user will benefit from a cooperative protocol, which means that for the coverage problem a simple relay or multi-hop communi- cation protocol is more suitable. Rankov and Wittneben must have had similar thoughts and motivations when they had the ingenious idea to propose the bidirectional relaying5 concept in [RW05a, RW05b, RW07].

In more detail, in [RW05a] two spectrally efficient amplify-and-forward protocols for uni- directional and bidirectional relaying are studied. The unidirectional protocol bases on a strategy where two relay nodes alternately forward messages from the source to the destina- tion which we similarly proposed in [OS04]. They show that for a sufficiently bad inter-relay channel the strategy achieves roughly the performance of a full-duplex amplify-and-forward protocol. For the bidirectional amplify-and-forward protocol two nodes, namely node 1 and node 2, want to communicate through the support of a common half-duplex relay node. In the first time slot nodes 1 and 2 transmit their signal to the relay. The relay node scales the received signal according to its transmit power constraint and retransmits the signal to nodes 1 and 2 in the following time slot. Since nodes 1 and 2 know their own transmitted signals they can subtract their contribution before decoding. Thereby, each unidirectional link still suffers from the additional resource allocation due to the half-duplex node, but the sum-rate is significantly increased since the relay transmission supports two communication links at the same time. Note that for the bidirectional protocol between nodes 1 and 2 is no direct link because both nodes simultaneously transmit in the first phase and receive in the second phase. A similar strategy for a satellite communication is proposed in the patent [DMM97].

In [RW05b] Rankov and Wittneben extend the previous spectrally efficient protocols to the case where the relay nodes support the communication by a decode-and-forward strategy. The unidirectional protocol with multiple relay nodes leads to an interference channel prob- lem [CT91] so that this protocol works well for a weak and strong inter-relay channel. The bidirectional decode-and-forward results in a multiple access channel when nodes 1 and 2

5The bidirectional relaying protocol is also known as the two-way relay channel.

7 1 Introduction transmit their information for each other to the relay node. After the relay node successfully decoded the messages it re-encodes them using superposition encoding and forwards the new codeword to nodes 1 and 2. Again, both nodes use the knowledge about their own message to improve their decoding capabilities. Thereby, it is important to notice that they do not allow cooperation between the encoders of nodes 1 and 2 by feedback, which may improve the performance. Nonetheless, their final sum-rate performance comparison of all proposed half-duplex spectrally efficient protocols shows that the bidirectional decode-and-forward protocol is the most efficient. We see that if bidirectional communication between the nodes 1 and 2 is desired and the direct link is sufficiently bad, the bidirectional protocol “trades” the direct links in two half- duplex relay channels (same routing problem) for increased spectral efficiency. For that reason, we think that this is conceptually a wise approach for coverage problems where we have the problem of a weak direct link. In Chapter 2 we study cross-layer design aspects of this bidirectional decode-and-forward protocol for half-duplex nodes. In [RW06] Rankov and Wittneben study the achievable rate region for the restricted full- duplex case. In all works they follow an analogy which Shannon phrased at his Kyoto lec- ture6 in 1985 as follows “A basic idea in information theory is that information can be treated very much like a physical quantity, such as mass or energy”. However, in the work “Network information flow” from Ahlswede, Cai, Li, and Yeung [ACLY00] it is shown that “it is in general not optimal to regard the information to be multicast as a “fluid” which can simply be routed or replicated. Rather, by employing coding at the nodes, which [they] refer to as network coding, bandwidth can in general be saved”. This seminal work establishes a new direction in multiterminal source coding and is closely related to graph theory. The main result is a Max-flow Min-cut Theorem for the information flow in a multi-terminal source coding problem with one information source and error-free links. It says that the maximum rate that a sender can multicast to a set of receivers is given by the minimum cut between source and receivers. They also present a simple example from Yeung [Yeu95] which shows that a multi-source problem is not a trivial extension. Finally they conclude that “coding by superposition is not optimal in general.” These works have caused a paradigm shift and have stimulated a new flourishing research area in information theory. The textbook [Yeu02, Chap. 11 and 15] and the tutorial [Yeu05] are good introductions into this rapidly growing research field and provide more extensive reference lists than we can give. Ahlswede et al. do not restrict in their work the encoding functions at the terminals. Li, Yeung, and Cai prove in [LYC03] that linear coding over a certain base field suffices for a multicast problem. In [KM03], Koetter and Medard present an algebraic framework for the design of linear network codes in a finite field. Today, linear encoding functions based

on the addition in finite fields, especially XOR-Operation in F2, have found formidable prominence in the design of network codes. This may go back to the famous “butterfly

6Ahlswede cited this in his Shannon Lecture 2006 [Ahl06].

8 1.1 Trends and Motivations – Related Literature network” [Yeu05, Ex. 1.1], [ACLY00, Fig.7] which shows with a striking simplicity the potential of network coding. With a specific grouping of the terminals the “butterfly network” describes a bidirectional communication network [Yeu05, Ex. 1.3] which suggests the relay node to perform an XOR-operation. Then it is interesting to see that the relay node together with the error-free channels to nodes 1 and 2 describes exactly the XOR-channel of Shannons example for the two-way channel [Sha61, Fig. 4]. Without considering channel coding aspects we find this XOR encoding example for bidirectional relaying in [Yeu05, Ex. 1.4], in a multi-hop context with a simple acknowledgment protocol in [WCK05], and with a cyclic redundancy check at the relay node in [LJS05]. Popovski and Yomo propose in [PY06] a Denoise–and–Forward protocol, where the relay tries to eliminate the noise in the received sum signal by estimation.

The proposed strategies based on network coding principles also show that bidirectional communication can increase the achievable sum-rate. The channel coding strategy of Rankov and Wittneben treats information as a physical entity, which is in a multi-terminal source cod- ing problem in general not optimal. For that reason, in Chapter 3 we study bidirectional re- laying with classical channel coding arguments following the philosophy of network coding. We see that the bidirectional relaying with decode-and-forward is a channel where super- position encoding is indeed not optimal. Unfortunately, we obtained these results after our cross-layer design studies presented in Chapter 2, where we assume separated information flows using superposition encoding.

There is lots of work ongoing to transfer the network coding idea to wireless network prob- lems. The easiest way would be to separate channel-coding and network-coding, but this is in general not optimal. In [EMH+03] it is shown that separation holds for some networks, but they also provide networks where separation fails. Likewise in [RK06] it is shown for a relay network with deterministic channels that channels separation does not hold in general. For that reason, the design of joint network-channel codes is indispensable. In [HSOB05] Hausl, Schreckenbach, Oikonomidis, and Bauch introduce a joint network-channel code based on a distributed Low-Density Parity-Check code for the two-way relay channel, where encoders and decoders are designed such that all the network coded parity bits send by the relay node are useful for the decoding at both users. Then in [HH06] Hausl and Hagenauer extend the concept to a turbo network code for the two-way relay channel. Finally in [HD06] we can see for the multiple access relay channel that the joint network-channel coding approach performs better than the separate network-channel coding or a distributed turbo code ap- proach.

9 1 Introduction

1.2 Contribution and Outline of the Thesis

In Chapter 2 we study bidirectional relaying based on superposition encoding as proposed in [RW05b], which means that we consider separated information flows. We study differ- ent cross-layer design aspects to improve the efficiency and realize synergetic benefits. As performance metric we consider the achievable rates assuming discrete-time memoryless Gaussian channels. For that reason, we briefly review some information theoretic arguments in between to introduce the achievable rates as performance metric.

• In Section 2.2 we intensively examine the achievable bidirectional rate region of a fixed and optimal time division approach where the nodes are equipped with a single- antenna element. For a complete understanding of the combinatorial properties we discuss for different desired rate-pairs the minimal necessary signal-to-noise ratios in the broadcast phase. Furthermore, we specify the sum-rate optimal rate pairs for different rate regions. This allows us to characterize in closed form the achievable rate pairs for the equal and optimal time division case where the weighted rate sum is maximized, so called Pareto optimal rate pairs7. In the last subsection we characterize the bidirectional achievable rate region for the optimal time division with scaled mean power constraints, which corresponds to a different interpretation of the constraint for a code word concerning its code word length. Parts of the results are published in [OB06b, OB07a], and should be published in [OB06e] and [OB07b]. • In Section 2.3 we introduce and study a queueing model and consider a throughput optimal resource allocation policy based on the maximum differential backlog algo- rithm developed by Tassiulas and Ephrimedes [TE92]. We prove the stability region of bidirectional relaying using standard arguments for the proof as done in [NMR03], which base on a well-developed Lyapunov drift analysis of [MT93]. Additionally, we present some numerical simulation results. Parts of the results are published in [OB06d, OB07a], and should be published in [OB06e]. • In Section 2.4 we consider the routing problem of finding the best relay node in a network where N nodes are willing to support the bidirectional communication be- tween the nodes 1 and 2. We propose to do relay selection based on the achievable rate region using the Pareto optimal rate pairs. Finally, we prove that for independent and identical Rayleigh distributed fading channels the sum of the ergodic achievable rate pairs on the boundary of the equal and optimal time division cases asymptotically scale with Θ(log(log(N))). Parts of the results are published in [OB07a, OB07e], and should be published in [OB06a].

7A feasible point of a vector optimization problem is Pareto optimal if and only if there is no feasible point which is better in all entries of the vector-valued objective [BV04, Sect. 4.7.3.]. Accordingly, in our context it means that rate pairs on the boundary in the first quadrant are Pareto optimal since we cannot increase one rate without decreasing the other.

10 1.2 Contribution and Outline of the Thesis

• In Section 2.5 we add a multicast of the relay node to the bidirectional relaying pro- tocol. We examine the joint resource allocation for both routing tasks. Furthermore, we characterize the optimal decoding order and the total sum-rate optimum for any fixed time division. Thereby, we identify a rate trade-off property which characterizes the interchange of bidirectional rate with relay multicast rate while the total sum-rate remains constant. After that we provide an extensive combinatorial discussion regard- ing the trade-off, a desired relay rate, and the total sum-rate maximum with respect to the time division. Parts of the results are published in [OB07a, OB07d], and should be published in [OB06c].

• In Section 2.6 we consider bidirectional relaying between nodes equipped with mul- tiple antennas. Therefore, we briefly review the information theoretic concepts for vector-valued processing and examine the optimal resource allocation assuming per- fect channel knowledge at the transmitters as well. The look at the high power behavior shows a linear growth of the sum of any rate pair on the boundary of the achievable rate region with respect to the spatial degree of the vector channels and time division. Parts of the results are published in [OB07c].

• In Section 2.7 we sum up the main results of this chapter and discuss some connections between them.

In Chapter 3 we derive an optimal coding strategy for the two-phase bidirectional decode- and-forward relaying protocol without feedback. This means that we consider the two-phase protocol where we require that the relay node has to decode the messages in the first phase and forwards the re-encoded messages in the succeeding broadcast phase. Thereby, we do not allow cooperation between the encoders of nodes 1 and 2. We derive the capacity region with respect to the maximal error probability by proving a coding theorem and a weak con- verse. For the illustration of the results we present an example based on the binary erasure multiple access channel and the binary symmetric broadcast channel. After that we give a brief discussion and refer to further results regarding a strong converse and practical coding aspects. Parts of the results are published in [OSBB07, BOSB07, SOS07] and should be published in [OBSB07].

Finally, we conclude the thesis in chapter 4 where we give an outlook on future research directions and present examples how the bidirectional relaying protocol can be integrated in wireless networks. A complete publication and reference list finalizes the thesis.

Further results which are not part of the Thesis

During my work at the Technical University of Berlin we obtained further interesting results which are not part of this Thesis.

11 1 Introduction

• In [OB03a] and [OB03b] we characterize the optimal power allocation for an amplify- and-forward cooperative system with and without a direct link between source and destination respectively. The single-antenna transmit nodes form a distributed antenna array, which results in a vector channel to the multi-antenna destination node. We assume a sum-power constraint between all transmitters. In [OB03a] we show that the asymptotic power distribution differs to the equal power distribution of a classical MIMO channel. Furthermore, we see that the capacity saturates in the high power regime due to the noise amplification. On the other hand, in [OB03b] we find a new behavior for a scenario where a cooperative station has a larger channel gain than of the direct link. If both channels are highly correlated it shows that it is optimal to use the cooperative node only in the low power regime. This means that with increasing sum-power it is optimal to turn off the cooperative relay node, which is again due to the additional noise of the relay node.

• In [OS04, OB05, OSB06] we propose a cooperative transmission scheme which cir- cumvents the spectral loss due to the pre-log factor from the half-duplex restriction. Therefore, we need at least two cooperating nodes which alternatively either transmit or receive so that at any time the signal from the source is retransmitted after a linear processing by at least one relay node. It follows that we prevent the pre-log factor by allocating additional resource in space. But the retransmission scheme could also cause an unstable system. Accordingly, we find the condition for the linear processing which ensures system stability. Moreover, we present a necessary and sufficient con- dition so that the relay network has a finite impulse response, which limits the impact of the noise added by the relay nodes. We end up with a system equation which is equivalent to a transmission over a frequency-selective channel with additive colored noise. For the evaluation of the relay network we study the frame error performance of a proposed suboptimal Viterbi-decoder, a maximum likelihood sphere-decoder, the performance of a detector based on the semidefinite relaxation method and the di- versity order8. Furthermore, we derived the capacity with equal power distribution between the nodes, which can be solved using Jensens formula [Rud66] and charac- terize channel conditions where the relay network will always have a better pair-wise error probability.

• In coauthored works with Aydin Sezgin we obtain results on the field of Space-Time Block Codes. In [SO04a] we propose a transmit strategy which bases on regular block Markov encoding. In [SO04b, SO04d, SO04c] we find and utilize spectral properties of quasi-orthogonal Space-Time Block Codes.

8These discussions were made in the context of the supervised diploma theses: “Analysis of Sphere Decoding in linear cooperative wireless Relay Networks" of Benjamin Schubert and “Diversity order analysis of com- plexity efficient decoding techniques in linear cooperative wireless relay networks" of Rafael Wyrembelski.

12 1.2 Contribution and Outline of the Thesis

• In the coauthored work with Eduard Jorswieck [JOB05], we study the impact of chan- nel correlation on diversity combiners in a flat fading single-input multiple-output sys- tem using majorization theory [MO79].

13

2 Bidirectional Relay Communication using Superposition Encoding

2.1 Introduction

We consider a three-node network where two nodes communicate with each other using the support of a half-duplex relay node. The inherent spectral loss of unidirectional protocols can be significantly reduced through bidirectional relaying. In this chapter we study some cross- layer design aspects of the bidirectional relaying decode-and-forward protocol which was proposed by Rankov and Wittneben in [RW05b, RW07]. Therefore, we assume discrete- time memoryless Gaussian channels between the nodes. At the relay node we apply the superposition encoding technique so that we consider separated information flows.

System Model

The bidirectional two-hop communication is established in two phases, namely the multi- ple access (MAC) phase and the broadcast (BC) phase, c.f. Figure 2.1. The protocol starts with the multiple access phase where node 1 transmits a message with rate R1 and node 2 transmits a message with rate R2 to the relay node simultaneously. The relay node decodes both messages. In the succeeding BC phase the relay broadcasts the re-encoded messages where it uses superposition encoding technique. Since for each receiving node in the BC phase one message originates from itself, each receiving node performs interference cancel- lation before decoding the unknown message. This results in two separated interference-free transmissions essentially.

h1 h2 h1 h2

1 R 2 1 R 2

(a) MAC phase (b) BC phase

Figure 2.1: A three-node network, where each node is equipped with one antenna element.

15 2 Bidirectional Relay Communication using Superposition Encoding

In this thesis we do not allow cooperation between the two phases. This means that we do not allow any feedback which could be used for cooperation between the encoders. For Shannon’s two-way channel [Sha61] this is known as the restricted two-way channel. Fur- thermore, we assume that the noise and information sources at nodes 1 and 2 are independent and all nodes are perfectly synchronized. Throughout the chapter we consider a baseband discrete-time system. We assume a multi- plicative channel model which includes the physical channel, the shaping pulse at the trans- mitter, and the whitening matched filter at the receiver. Unless otherwise stated, the channel is considered to be a single-input single-output (SISO) linear time-invariant system, which can be seen as a snapshot of a time-varying flat fading channel. Let h C denote the channel gain between node 1 and the relay node and h C denotes 1 ∈ 2 ∈ the channel gain between node 2 and the relay node. For notational simplicity we assume reciprocal channels. Then after symbol-rate sampling the system equation for time instants m in the MAC phase is given by

yR[m]= h1x1[m]+ h2x2[m]+ nR[m], where yR[m] denotes the received signal at the relay node, x1[m] and x2[m] denote the transmit signals of nodes 1 and 2, and nR[m] denotes the additive noise. Similarly, after symbol-rate sampling the system equation for time instants m in the BC phase is given by

yk[m]= hkxR[m]+ nk[m], k = 1, 2, where yk[m] denotes the received signal at node k = 1, 2, xR[m] denotes the transmit signal of the relay node, and nk[m] denotes the additive noise at node k = 1, 2. We assume that the noise at each antenna is independent additive white Gaussian noise with zero mean and power σ2. Due to the central limit theorem, the Gaussian noise assumption is reasonable for a wide class of practical channel models, e.g. thermal noise is modeled by a Gaussian distri- bution. For each node we have a mean transmit power constraint P , k 1, 2, R , so that k ∈ { } we can define the signal-to-noise ratios γ := P /σ2, k 1, 2, R . Throughout the thesis k k ∈ { } we consider normalized powers. Without further notification, we assume that h , h , and | 1| | 2| Pk, k 1, 2, R are strictly positive because otherwise bidirectional communication would not be∈ possible. { } In this thesis we consider an orthogonal resource allocation for the two phases in the time domain. Conceptually the results can be easily transfered to an orthogonal resource allo- cation in the frequency domain, but then we have to consider the capacity of bandlimited channels. We assume that all links are reciprocal. In practical systems this condition is ful- filled if the round-trip time of both phases is shorter than the coherence time of the channel. Similarly, if we allocate orthogonal resources in frequency domain the condition is fulfilled if the frequency separation is smaller than the coherence bandwidth. However, in this thesis

16 2.1 Introduction we look at the rates which are achievable for a given channel realization. Therefore, channel reciprocity and equal noise powers are not necessary assumptions since with an appropriate substitution of the individual transmit power constraints we can include the general case.1 Finally, we want to remark that in most sections we assume a time-invariant channel model. For the cases where we consider a time-variant channel model we are interested in the time averages of the achievable rates. Therefore, we assume that the channel remains constant long enough so that we can achieve the information theoretic rate. An optimization of the resource allocation over the time-variance of the channels is out of the scope of the thesis.

Outline of this Chapter

In Section 2.2 we examine the achievable bidirectional rate region for a fixed and optimized time division between the two phases. For a complete understanding of the combinatorial properties we first study minimal necessary signal-noise ratios γR to support a certain rate pair in the MAC phase and characterize the sum-rate optimal rate pairs of the rate region of each phase and of the bidirectional protocol. After that, we characterize for any weight vector the corresponding rate pair on the boundary of the rate region that maximizes the weighted rate sum. Rate pairs on the boundary are Pareto optimal since they can be seen as solutions of a multi-objective optimization problem where we want to maximize each rate individually. We use these Pareto optimal rate pairs in the following two sections. In Section 2.3 we discuss a throughput optimal resource allocation policy based on a back- pressure strategy. In Section 2.4 we consider the problem of relay selection in a network based on the achievable rate region. Furthermore, we look at the asymptotic growth of the ergodic rate region assuming independent and identical Rayleigh distributed channels.

In Section 2.5 we examine the joint resource allocation for the bidirectional relaying and an additional multicast of the relay node. We characterize the optimal decoding order and the total sum-rate maximum. Furthermore, we characterize a rate trade-off property where the total sum-rate remains constant. After that we present a combinatorial discussion of the results. In Section 2.6 we consider the achievable rate region of bidirectional relaying be- tween nodes equipped with multiple antennas. Therefore, we briefly review the information theoretic concepts for vector-valued processing and present the optimal resource allocation assuming perfect channel knowledge at the transmitters. Finally, we identify the linear scal- ing law of the achievable rates in the high power regime.

For a clear presentation we illustrate many results by examples or numerical simulations. In

1 2 Let hkl and σk with k,l ∈ {1, 2, R} denote the channel coefficient of the channel from node k to node l and 2 2 2 2 |hRk| |hk| |hkR| σk the noise power at node k. Then with the substitution 2 = 2 , and P˜k = Pk 2 2 , for k = 1, 2, σk σ |hRk| σR we can transfer our results to individual channel coefficients and noise powers.

17 2 Bidirectional Relay Communication using Superposition Encoding

Section 2.7 we give a comprehensive discussion about the cross-layer design aspects consid- ered in this chapter.

2.2 Achievable Rate Region of Bidirectional Relaying

Rankov and Wittneben only looked at the sum-rate performance assuming an equal time division between the MAC and the BC phase. Since bidirectional communication is charac- terized by a two-dimensional rate vector, for cross-layer design aspects we need to know the whole achievable rate region in detail. Moreover, we notice that we can obviously enlarge the achievable rate region if we optimize the time division between the phases.

In this chapter we regard information as a “fluid”, which means that multiple messages are encoded by using the superposition encoding technique. Then the decoding of multiple mes- sages is done successively. This means that when we decode the codeword of a message we regard the codewords of the succeeding unknown messages as additional noise. After the successful decoding of the message the interference of the corresponding codeword is canceled, which reduces the noise level for the succeeding messages and therefore improves the decoding capability. This decoding technique is known as successive interference can- cellation. For the encoding of multiple messages it follows that we can apply the encoding principles of the single-user point-to-point communication where the encoding has to factor in the position in decoding sequence. For that reason we first briefly look at the results for the simple single-input single-output (SISO) Gaussian channel. These can be found in most textbooks on information theory or good books on wireless communications, e.g. [Gal68], [CT91], or [TV05]2. Then we will briefly discuss the results regarding the capacity region of the Gaussian multiple access channel for completeness. For the achievable rate region of the broadcast phase we use the results of the Gaussian channel. In the rest of the section we study the resulting achievable rate region of the bidirectional relaying protocol.

2.2.1 Gaussian Channel

We start with a simple single-input single-output discrete-time memoryless AWGN channel. We assume complex signaling, which is motivated by the baseband processing. Furthermore, we include a time-invariant multiplicative channel coefficient in this discussion. This results in a linear channel model with a multiplicative and additive distortion of the transmit signal

2We have argued as for an additive channel model like the AWGN channel since this is the most interesting channel for wireless communication. But the basic arguments also apply for more general settings, where we translate noise or interference with uncertainty so that interference cancellation corresponds to a reduction in uncertainty.

18 2.2 Achievable Rate Region with a channel coefficient h, which is perfectly known at the receiver, and a complex Gaus- sian noise random variable N (0,σ2) respectively. We consider a continuous-valued ∼ CN input and output where the complex random variables X and Y with support sets Y and X represent single letters of our transmit and receive signals. For the transmit signalS we requireS a transmit power constraint so that the second moment of the random variable is bounded 2 by some constant P , i.e. E X P . We assume that the noise is independent of the {| | } ≤ transmit signal. Then the single letter input-output relation can be expressed as follows

Y = h X + N.

A single letter description will be sufficient since we consider a memoryless channel.

In the seminal work [Sha48] Shannon studied the problem of how best to encode the in- formation a sender wants to transmit. For that goal he introduced the concept of mutual information which measures the amount of information one random variable reveals about another. Twenty years before, Hartley introduced in communications the concept of entropy as a measure of uncertainty about a random variable from thermodynamics. Then the mutual information characterizes the reduction in uncertainty. It therefore measures the quantity of transmitted information.

Since we consider a channel with continuous alphabets, we get the mutual information in terms of differential entropies3 [CT91, Chapter 9],

I(X; Y ) := h(Y ) h(Y X)= h(Y ) h(N). − | − The differential entropy h(Y ) of a continuous random variables X defined on the support set with the density f (y) is defined as SY Y

h(X) := f (y) log f (y)dy. − Y Y ZSY Since the logarithm is to the base two, we measure the entropy in bits. The conditional differential entropy h(Y X) of the random variables (Y, X) defined on the support set | SY × with the joint and conditional densities f (y,x) and f (y x) is defined as SX Y,X Y |X |

h(Y X) := f (y,x) log f (y x)d(y,x)= h(X,Y ) h(Y ). (2.1) | − Y,X Y |X | − ZSY ×SX 3In the classical Gaussian channel there is no channel coefficient h. Therefore, for our channel model some authors write I(X; Y, h) to indicate the channel knowledge at the receiver. Since we assume perfect channel knowledge at the receivers throughout the thesis, we skip this entry to keep the notation simple. Furthermore, often real-valued signaling is considered. Conceptually there is no difference between complex and real processing since we can consider each use of a complex AWGN channel as two uses of a real AWGN channel.

19 2 Bidirectional Relay Communication using Superposition Encoding

Then the differential entropy of a complex Gaussian random variable Z with density φ(z)= 2 1 exp( |z−µ| ) is given by πσ2 − σ2 φ(z) 1 z µ 2 h(Z)= φ(z) log(φ(z))dz = ln( ) | − | dz − − ln(2) πσ2 − σ2 ZSZ ZSZ 1  = log(πσ2)+ = log(e πσ2). (2.2) ln(2)

Therewith, we get the differential entropy of the noise as h(N) = log(e πσ2).

The next important quantity is the relative entropy D(f g) := f log f/g (with || 0 log(0/0) := 0) between two densities f and g which are finite only if the support set R of f is contained in the support set of g. From Jensen’s Inequality4 we know that the relative entropy between two densities f and g is always non-negative, D(f g) 0 [CT91, Theo- || ≥ rem 9.6.1]. It follows that for any complex random variable Z defined on the support set SZ with density f(z) and E z 2 = σ2 we have h(Z) log(e πσ2). This can be easily seen {| | } ≤ by the following: Let φ(z) be the density of a complex Gaussian random variable according to (0,σ2), then CN

0 D(f φ)= f log(f/φ)= f log(f) f log(φ) ≤ || − ZSZ ZSZ ZSZ f(z) 1 z 2 = h(Z) ln | | dz = h(Z) + log(e πσ2). − − ln(2) πσ2 − σ2 − ZSZ   

It follows that the complex normal distribution (0,σ2) maximizes the entropy over all complex distributions with the same second moment.CN

Since the noise N is independent of the input X, for the second moment of the output we have

2 2 2 2 2 2 2

E E E E Y = h X + N = h X + N h P + σ . {| | } {| | } | | {| | } {| | }≤| | Then it follows from the previous that the differential entropy of the output is maximized with h(Y ) = log(e π( h 2P +σ2)) if the input X is distributed according to complex normal | | distribution (0, P ). This means that Gaussian distributed codebooks are optimal. CN The information capacity C of the Gaussian channel is defined as the maximum mutual in- formation between the input and output over all input distributions that satisfy the power

4Jensen’s Inequality can be formulated in different notations. In the notation of probability theory let X be a

Ê E random variable with support SX ⊆ Ê and let f : SX → be a convex function, then we have {f(X)} ≥

f(E{X}).

20 2.2 Achievable Rate Region constraint [CT91, Chapter 10]. With the previous considerations we can express the infor- mation capacity as follows

C := max I(X; Y ) = max h(Y ) log(e πσ2)

2 2 E fX (x): E{|X| }≤P fX (x): {|X| }≤P − (2.3) h 2P = log e π( h 2P + σ2) log(e πσ2) = log 1+ | | . | | − σ2   Then the result of Shannon’s work says that one can construct a sequence of block codes that satisfies the power constraint, has a rate smaller but arbitrary close to the information capacity, and has a maximum probability of error which tends to zero with increasing block code length. Therefore, the information capacity is also the supremum of the achievable rates of the channel which means that the operational and information capacity are equal. For more details we refer to any information theory text book that covers the channel coding theorem for the Gaussian channel, e.g. [CT91].

2.2.2 Multiple Access Phase

In the multiple access phase of the bidirectional relaying protocol nodes 1 and 2 simultane- ously transmit independent messages m1 and m2 with rates R1 and R2 to the relay node. Thereby, the message m1 from node 1 is intended for node 2 and vice versa for message m2. For the MAC phase we apply the capacity achieving coding strategy. The capacity region for the discrete memoryless multiple access channel was independently derived by Ahlswede [Ahl71a] and Liao [Lia72] using finite set alphabets and is now part of any in- formation theory textbook that contains multiuser information theory, [Wol78], [CK81], and [CT91]5. The result of the capacity region can be modified to apply to continuous input and output alphabets with an additional mean input power constraints, which was independently done by Wyner in [Wyn74] and Cover in [Cov75]. From wireless communication point of view the multiple access channel with Gaussian channels is most important. Since the channel is memoryless, it is sufficient to consider single-letters only. Then the input-output relation of the discrete-time memoryless Gaussian multiple access channel is given by YR = h1 X1 + h2 X2 + NR.

The continuous random variable YR denotes the output at the relay node and the continuous random variables X1 and X2 denote the inputs from the nodes 1 and 2, which are all complex since we consider baseband signaling. The complex coefficients h1 and h2 model the time- invariant channel gains between the nodes. The received signal at the relay node is distorted

5We reproduce the theorem in Section 3.1.2 where we present a coding theorem for the BC phase of the bidirectional relay channel using finite set alphabets. Here, we only present the result for the Gaussian channel which we consider in this chapter.

21 2 Bidirectional Relay Communication using Superposition Encoding

2 by complex additive white Gaussian noise NR (0,σ ). Then the multiple access capacity region is given by the convex hull∼ of the CN set of rate pairs satisfying CMAC R I(X ; Y X ), 1 ≤ 1 R| 2 R I(X ; Y X ), 2 ≤ 2 R| 1 R + R I(X , X ; Y ), 1 2 ≤ 1 2 R 2 for some input distribution f (x ) which satisfies the input power constraints E X Xk k {| k| }≤ Pk, k = 1, 2. With the same arguments as in Section 2.2.1 it can easily be shown that com- plex Gaussian input distributions with X (0, P ), k = 1, 2, maximize I(X ; Y X ), k ∼ CN k 1 R| 2 I(X2; YR X1), and I(X1, X2; YR). Since in the scalar case all mutual informations are si- multaneously| maximized, it follows that the rate constraints are tight so that the capacity region of the MAC phase is given by

2 MAC := [R , R ] Ê : R R−→, R R−→, R + R R CMAC 1 2 ∈ + 1 ≤ 1R 2 ≤ 2R 1 2 ≤ Σ n o with the individual and sum-rate constraints

R−→ := log 1+ γ h 2 , (2.4a) 1R 1| 1| R−→ := log 1+ γ h 2 , (2.4b) 2R 2| 2|  MAC 2 2 RΣ := log 1+ γ1 h1 + γ2 h2 , (2.4c) | | | |

P1 P2  and signal-to-noise ratios γ1 = σ2 and γ2 = σ2 . Similarly to the Gaussian channel it is possible to construct a sequence of block codes that satisfies the power constraints and achieves a rate pair [R1, R2] MAC arbitrary close while the maximum probability of error tends to zero with increasing∈ C block length [CT91]. 6 For that reason we assume error-free decoding in the MAC phase if [R1, R2] MAC for the following cross-layer design. ∈ C

Since MAC is a pentagon, it can be completely described by five vertices. Thereby, the verticesC where the individual rate constraints intersect with the sum-rate constraint,

2 γ2 h2 ν −→ Σ1 with Σ1 MAC −→ (2.5a) Σ1 := R1R, R2 R2 := RΣ R1R = log 1+ | | 2 , − 1+ γ1 h1  | 2 |    γ1 h1 ν := R2Σ, R−→ with R2Σ := RMAC R−→ = log 1+ | | , (2.5b) 2Σ 1 2R 1 Σ − 2R 1+ γ h 2 2| 2|     are most interesting for the combinatoric as seen in [TH98]. To achieve the vertices, we have to apply successive interference cancellation. This means that in the first decoding step the

6If we can make the error of the MAC and of the BC phase arbitrary small, it follows from the union bound that we can make the error of the bidirectional relay channel arbitrary small.

22 2.2 Achievable Rate Region codeword of the second message to decode is regarded as additional noise. After decoding the first message the interference of the corresponding codeword is canceled so that we can decode the second message without interference. Then each vertex corresponds to a specific decoding order. To achieve νΣ1 we have to decode the message m2 before m1 and vice versa for ν2Σ. In the following we often consider the boundary of the rate region and therefore define the interesting sections of the boundary as follows

2 Σ1 −→ := [R−→, R ] Ê : 0 R R , (2.6a) R1R 1R 2 ∈ + ≤ 2 ≤ 2 n 2 2Σo −→ := [R , R−→] Ê : 0 R R , (2.6b) R2R 1 2R ∈ + ≤ 1 ≤ 1 MAC n MAC 2 2Σ o := [R , R R ] Ê : R R R−→ . (2.6c) RΣ 1 Σ − 1 ∈ + 1 ≤ 1 ≤ 1R n o MAC The set Σ specifies the dominant face of the pentagon and characterizes the sum-rate optimalR rate pairs in the MAC phase. We can achieve the rates on the dominant face by time-sharing between νΣ1 and ν2Σ or by a rate splitting technique according to [RU95].

2.2.3 Broadcast Phase

In the succeeding BC phase the relay forwards the previously received message m1 to node 2 and message m2 to node 1. In this chapter we follow the superposition encoding strategy as proposed in [RW05b]. Therefore, the messages m1 and m2 are separately encoded as for the point-to-point Gaussian channel. Since we consider a memoryless channel, it is again sufficient to consider single-letters only. Then the input random variable of the relay node using superposition encoding is given by

XR = W1 + W2, where the random variables W1 and W2 correspond to the codewords of the messages m1 for node 2 and m2 for node 1. Since the messages m1 and m2 are independent, the random variables W1 and W2 are independent as well. From this we get the output at nodes 1 and 2 as follows

Yk = hk XR + N1 = hk W1 + hk W2 + Nk, k = 1, 2.

Since the messages m1 and m2 originate from nodes 1 and 2 respectively, at each receiving node one message and therefore one codeword is known. This a priori knowledge allows the receiving nodes to subtract the interference caused by the codeword of its own message. With this interference cancellation technique we essentially have an interference-free reception at each receiving node, which results in two equivalent single-user AWGN channels. It follows

23 2 Bidirectional Relay Communication using Superposition Encoding

that the achievable rates in the BC phase using superposition encoding, i.e. XR = W1 +W2, have to fulfill the constraints

R I(X ; Y W )= I(W ; h W + N ), 2 ≤ R 1| 1 2 1 2 1 R I(X ; Y W )= I(W ; h W + N ), 1 ≤ R 2| 2 1 2 1 2 2 for some input distribution fWk (wk), k = 1, 2, satisfying the power constraint E XR =

2 2 {| | } E E W + W P . {| 1| } {| 2| }≤ R Obviously, the mutual informations are only coupled by the relay input power constraint, which means that we have to distribute the power PR on both codewords. Let β1 and β2 denote the proportion of relay transmit power PR spend for the codewords W1 and W2 respectively. Then the simplex

:= [β ,β ] [0, 1] [0, 1] : β + β 1 B { 1 2 ∈ × 1 2 ≤ } characterizes the set of feasible relay power distributions that satisfy the relay transmit power constraint. For a given feasible relay power distribution [β ,β ] we know 1 2 ∈ B from Section 2.2.1 that complex Gaussian distributed inputs W (0,β P ) and 1 ∼ CN 1 R W (0,β P ) maximize the mutual informations. It follows that with the super- 2 ∼ CN 2 R position encoding in the BC phase we can achieve any rate pair within the rate region

2 := [R , R ] Ê : R R−→(β ), R R−→(β ), with [β ,β ] RBC 1 2 ∈ + 1 ≤ R2 1 2 ≤ R1 2 1 2 ∈ B n o with rate constraints

2 R−→ :[0, 1] Ê , β log 1+ γ β h , (2.7a) R2 → + 1 7→ R 1| 2| 2 R−→ :[0, 1] Ê , β log 1+ γ β h , (2.7b) R1 → + 2 7→ R 2| 1| 

PR  and signal-to-noise ratio γR = σ2 . In next proposition we show that in the BC phase we do not need the convex hull operation as in the MAC phase since is already convex, which means that in the BC phase time- RBC sharing is not necessary.

Proposition 2.1. is convex. RBC

Proof. The proof can be found in Appendix 2.8.1.

Similarly to the Gaussian channel it is possible to construct a sequence of block codes that satisfies the power constraint and achieves a rate pair [R , R ] arbitrary close while 1 2 ∈ RBC the maximum probability of error tends to zero with increasing block length. For that reason

24 2.2 Achievable Rate Region

we assume error-free decoding in the BC phase if [R1, R2] BC for the following cross- layer design. ∈ R

For any rate pair on the boundary of the BC region we obviously have β1 + β2 = 1. Accord- ingly, the boundary of can be parametrized by the rate pair function RBC

2 R : [0, 1] Ê , β R−→(β), R−→(1 β) , (2.8) BC → + 7→ R2 R1 − h i where we have β = β and β = 1 β. This allows us to characterize the sum-rate optimal 1 2 − rate pair in the BC phase.

BC Proposition 2.2. The maximum sum-rate RΣ := max R1 + R1 of the broadcast [R1,R2]∈RBC rate region is given by RBC 2 ⋆ log(1 + γR h1 ), if β < 0, (2.9a) | | 2 2 BC 1 2 |h1| 2 |h2| ⋆ RΣ = log (1 + γR h1 + 2 )(1 + γR h2 + 2 ) , if 0 β 1,(2.9b)  4 | | |h2| | | |h1| ≤ ≤  2 ⋆  log(1 + γR h2 ),  if β > 1, (2.9c) | |  ⋆ 1 1 1 1 with β := + 2 2 and is attained at the rate pair 2 2γR |h1| − |h2|  −→ if ⋆ , (2.10a) [0, RR1(1)], β < 0 ⋆ ⋆ ⋆ ⋆ ⋆ [R−→, R−→] := [R−→(β ), R−→(1 β )], if 0 β 1, (2.10b) R2 R1  R2 R1 − ≤ ≤  −→ if ⋆ , (2.10c)  [RR2(1), 0], β > 1

 2 2 ⋆ 1  2 |h2| ⋆ 1 2 |h1| with R−→(β ) = log (1 + γR h2 + 2 ) and R−→(β ) = log (1 + γR h1 + 2 ). R2 2 | | |h1| R1 2 | | |h2| Proof. The proof can be found in Appendix 2.8.2.

Furthermore, for any fixed relay power distribution β [0, 1] with β = β and β = 1 β ∈ 1 2 − in the BC phase we can achieve any rate pair in the rate region

(β) := [R , R ]: R R−→(β), R R−→(1 β) (2.11) RBC 1 2 1 ≤ R2 2 ≤ R1 − n o so that obviously BC = β∈[0,1] BC(β) holds. Finally, we want to remark that BC is larger than the rateR region of the degradedR broadcast channel, where for the encodingR and decoding for one receivingS node the own message is regarded as interference.

25 2 Bidirectional Relay Communication using Superposition Encoding

2.2.4 Bidirectional Achievable Rate Region

For the bidirectional relaying protocol we are in the MAC and BC phases for fraction of time only so that we have to scale the achievable rate pairs according to the time division. This means that for a time division parameter α [0, 1] we can achieve rate pairs R within ∈ the rate regions α in the MAC phase and (1 α) (β) in the BC phase with a CMAC − RBC relay power distribution β [0, 1]. For a successful bidirectional relay transmission of the ∈ message m1 with rate R1 from node 1 to node 2 and message m2 with rate R2 from node 2 to node 1 the rate pair R = [R , R ] has to be within the scaled MAC rate region α 1 2 CMAC as well as within the scaled BC rate region (1 α) (β). This means that for any given − RBC time division parameter α [0, 1] and relay power distribution β [0, 1] the achievable rate ∈ ∈ region of the bidirectional relaying (α,β) is given by the intersection RBR (α,β) := α (1 α) (β). RBR CMAC ∩ − RBC

In the following we will call R1 and R2 unidirectional rates. Since this applies to any relay power distribution β [0, 1], the achievable rate region of the bidirectional relaying with the optimal relay power∈ distribution for a fixed time division parameter α [0, 1] is given by the union over all possible relay power distributions ∈ (α) := (α,β)= α (1 α) (β) RBR RBR CMAC ∩ − RBC β∈[0,1] β∈[0,1] (2.12) S S = α (1 α) . CMAC ∩ − RBC

The set BR(α) is convex since the intersection of convex sets, α MAC and (1 α) BC, is itself convex.R C − R

We are now interested which relay power PR respectively signal-to-noise ratio γR is neces- M M sary to support a rate pair [R1 , R2 ] MAC for a given time division parameter α [0, 1]. From (2.7a) and (2.7b) we can conclude∈ C ∈

α RM 2 1−α 1 1 αRM = (1 α)log(1 + β γ h 2) β = − , 1 − 1 R| 2| ⇒ 1 h 2γ | 2| R α RM 2 1−α 2 1 αRM = (1 α)log(1 + β γ h 2) β = − . 2 − 2 R| 1| ⇒ 2 h 2γ | 1| R It can be easily seen by contradiction that for the minimum relay power we have 1 = β1 + β2. From this we get the minimum γR which is necessary to support a MAC rate pair [RM , RM ] for a time division parameter α as follows 1 2 ∈ CMAC α RM α RM 2 1−α 1 1 2 1−α 2 1 γmin(RM , RM , α) := − + − . (2.13) R 1 2 h 2 h 2 | 2| | 1|

26 2.2 Achievable Rate Region

This allows us to characterize the minimum relay power PR respectively signal-to-noise ratio γ which is necessary to support any rate pair in MAC rate region in the next R CMAC proposition.

Proposition 2.3. Given a MAC rate region and a time division parameter α where CMAC Σ1 min −→ Σ1 and 2Σ min 2Σ −→ denote the minimum γR (α) := γR (R1R, R2 , α) γR (α) := γR (R1 , R2R, α) γR necessary to support the vertices νΣ1 and ν2Σ. Then the minimum γR which is necessary to support any rate pair [RM , RM ] is given by 1 2 ∈ CMAC MAC Σ1 2Σ γR (α) := max γR (α),γR (α) .  In the case of equal time division, α = 1/2, we have

2 2 Σ1 γ1 h1 γ2 h2 1 2 γR ( / )= | 2| + | |2 2 , h2 (1 + γ1 h1 ) h1 | | 2 | | 2 | | 2Σ γ2 h2 γ1 h1 γ (1/2)= | | + | | . R h 2 (1 + γ h 2) h 2 | 1| 2| 2| | 2|

Proof. Since is a convex set which increases with increasing γ , any rate pair RBC R [RM , RM ] can be supported if γ is that large that both vertices of α are 1 2 ∈ CMAC R CMAC in (1 α) . − RBC

For the equal time division case we get for the vertex ν −→ MAC −→ Σ1 =[R1R, RΣ R1R] = [log(1+ 2 − 2 γ2|h2| Σ1 1 γ1 h1 ), log(1 + 2 )] the minimum relay power γ ( /2) and for the vertex ν = 1+γ1|h2| R 2Σ | | 2 MAC γ1|h1| 2 [R R−→, R−→] = [log(1 + 2 ), log(1 + γ2 h2 )] the minimum relay power Σ − 2R 2R 1+γ2|h1| | | 2Σ 1 γR ( /2) using (2.13).

MAC Using γR = γR allows to support all possible rate pairs from the MAC phase, but in general it is the minimal necessary γR for one vertex only. This leads to the idea that the relay node can use the remaining power to sent an own message additionally. In Section 2.5 we study a scenario where the relay node adds a multicast communication to the bidirectional relay communication.

1 α Remark 2.4. For the equal time division case, α = /2, we have 1−α = 1 so that we can explicitly calculate γΣ1(1/2) and γ2Σ(1/2) in terms of h 2, h 2,γ , and γ . For the same R R | 1| | 2| 1 2 reason some following closed-form results can be obtained for α = 1/2 only. For other time division parameter such an explicit solution is not possible, but the behavior is similar. Therefore, we often consider the equal time division case exemplarily.

27 2 Bidirectional Relay Communication using Superposition Encoding

0.6 |h |2 =0.6 0.6 |h |2 =0.6 1 1 |h |2 =1 |h |2 =1 2 2 γ =1.3 γ =1.3 1 1 γ =1 γ =1 2 2 0.4 γ =1.3 0.4 γ =1.3

[bit/channel use] R [bit/channel use] R 2 2

rate R 0.2 rate R 0.2

0 0 0 0.2 0.4 0.6 0 0.2 0.4 0.6 rate R [bit/channel use] rate R [bit/channel use] 1 1 (a) Bidirectional achievable rate region with (b) Bidirectional achievable rate region with 1 equal time division RBR( /2) (solid line), the optimal time division RBRopt (solid line) scaled achievable rate region of MAC phase and RBR(0.4, β) = 0.4 CMAC (solid line), 1 1 /2CMAC(dashed line), and the scaled achiev- RBR(0.436, β) (dashed line), RBR( /2, β) 1 able rate region of BC phase /2RBC (dotted (dotted line), RBR(0.56, β) (dashed-dotted line) line), and RBR(0.6, β) = 0.4 RBC (solid line).

Figure 2.2: Bidirectional achievable rate region of an example scenario

The next natural extension is to look at the achievable rate region where we additionally allow to optimize the time division between the MAC and the BC phase. This rate region is obviously given by the union over all possible time division parameters α as follows

BRopt := BR(α)= (α MAC (1 α) BC). (2.14) R α∈[0,1]R α∈[0,1] C ∩ − R S S As a union of convex sets the rate region BRopt need not be convex. Convexity can be achieved if we allow time-sharing betweenR bidirectional rate pairs with different time divi- sion parameters, but from the following Corollary 2.13 we will see that BRopt is already convex. This means that for any rate pair in there exists a time divisionR parameters RBRopt α for which this rate pair is achievable. In Figure 2.2 we depicted the achievable rate regions of an example. In the left figure we see the bidirectional achievable rate region BR(1/2) for the equal time division case, which is given by the intersection of the scaledR achievable rate regions of the MAC and BC phases. In the right figure we show the achievable rate region of the optimal RBRopt time division case. Additionally, the rate regions (α) for some fixed time division pa- RBR rameters α are depicted. The bullets (•) mark the rate pairs where rate pairs of (α) RBR achieve the boundary of . We see that we have (α) = α or RBRopt RBR CMAC ⊂ RBRopt (α) = (1 α) if the time division parameter is too small or too large re- RBR − RBC ⊂ RBRopt

28 2.2 Achievable Rate Region spectively. Furthermore, we see that for the time division parameter α = 0.436 two rate pairs achieve the boundary. Note that the marked rate pairs on the boundary correspond RBRopt to intersection points of the boundaries of the scaled MAC and BC regions. Lemma 2.11 ex- plains this observation and leads to an equivalent characterization of the bidirectional achiev- able rate region BRopt in Theorem 2.12. The simple description of the boundary allows us to identify for anyR given weight vector the rate pair which maximize the weighted rate sum in Theorem 2.16. In the following we study the properties of the bidirectional achievable rate region for the fixed and optimal time division. For the fixed time division we focus on the equal time division case7. For other fixed time division cases the behavior is similar, but often it cannot be calculated explicitly. After that, we identify the optimal time division and relay power distribution for an optimal rate allocation. From this we can deduce an equivalent description of . The previous studies allow us to characterize in details the boundaries of the RBRopt bidirectional achievable rate regions. In particular we are able to specify in closed form the rate pairs which maximize the weighted rate sum for any weight vector. For notationally simplicity we will use the abbreviations

:= (1/2) and (β) := (1/2,β). RBReq RBR RBReq RBR

Equal time division

With the first theorem and its corollaries we explore the combinatorial structure of the achiev- able rate region . In Theorem 2.5 we derive the maximal bidirectional sum-rate R (β) RBReq Σ for any relay power distribution β [0, 1]. As a direct consequence of the theorem we can ∈ characterize the achievable rate region (β) in Corollary 2.6. But we can also use the RBR result of Theorem 2.5 to characterize the minimal relay power which is necessary to support M M in the BC phase a rate pair [R1 , R2 ] MAC which achieves the maximal sum-rate in the M M MAC∈ C MAC phase, i.e. R1 + R2 = RΣ . Finally in Corollary 2.8 we identify the sum-rate optimal rate pair of . For the equal time division case the whole discussion leads to RBReq explicit expressions, but the combinatoric of BR(α) is the same for any α [0, 1], cf. Remark 2.4. R ∈ In Theorem 2.19 we use the explicit knowledge about the combinatoric to characterize in closed form the rate pairs on the boundary of BReq which maximize the weighted rate sum, so called Paretto optimal rate pairs. The ParetoR optimal rate pairs play a crucial role for the throughput optimal resource allocation policy in Section 2.3 and for the relay selection problem in Section 2.4.

7In the following the subscript eq or opt specify the corresponding rate, rate pair, or rate region for the equal time division or the optimal time division case.

29 2 Bidirectional Relay Communication using Superposition Encoding

Theorem 2.5. For bidirectional relaying with equal time division the maximal sum-rate RΣ(β) := max R1 + R2 of the bidirectional rate region BReq(β) for a given relay R∈RBReq(β) R power distribution parameter β [0, 1] is given by ∈ R (β)= 1 min RMAC, R−→ + R−→(1 β), R−→(β)+ R−→, R−→(β)+ R−→(1 β) Σ 2 Σ 1R R1 − R2 2R R2 R1 −  R−→ + R−→(1 β), if β , (2.15a) 1R R1 − ∈ I1 1 R−→(β)+ R−→, if β 2, (2.15b) =  R2 2R ∈ I 2  R−→(β)+ R−→(1 β), if β BC, (2.15c)  R2 R1 − ∈ I RMAC, if β , (2.15d) Σ ∈ IΣ  with sets  := [β , 1] [β ,β ] , I1 Σ1 ∩ B1 1B := [0,β ] [β ,β ] , I2 2Σ ∩ B2 2B ⋆2 (βBΣ,βΣB) , if β ∆β, Σ := (β2Σ,βΣ1) ≥ I ∩ ( , else, ∅ := [0, 1] ( ), IBC \ I1 ∪ I2 ∪ IΣ and characteristic values8 γ h 2 γ h 2 β := 1 2| 2| , β := 1| 1| , Σ1 − γ h 2(1 + γ h 2) B1 γ h 2 R| 1| 1| 1| R| 2| 1 γ h 2 β := 1+ , β := 1| 1| , 1B γ h 2 2Σ γ h 2(1 + γ h 2) R| 1| R| 2| 2| 2| 1 γ h 2 β := , β := 1 2| 2| , B2 −γ h 2 2B − γ h 2 R| 2| R| 1| β := β⋆ β⋆2 ∆β, β := β⋆ + β⋆2 ∆β, BΣ − − ΣB − 1 1 1q 1 1 qγ γ γ β⋆ = + , and ∆β := 2 R − 1 . 2 2γ h 2 − h 2 γ2 h 2 − h 2 R | 1| | 2|  R | 1| | 2|  Proof. The proof can be found in Appendix 2.8.3.

The sets , , , and characterize the active restriction for a given power distribution I1 I2 IΣ IBC β. If β , then the unidirectional rate R is limited by 1/2R−→ and R is limited by ∈ I1 1 1R 2 1/2R−→(1 β). Accordingly, if β then the unidirectional rate R is limited by 1/2R−→ R1 − ∈ I2 2 2R 8 The indices of the points of intersections of f1, f2, fΣ, and fBC, which are used in the proof, indicate the minimal function for smaller β by the first index and for larger β by the second index.

30 2.2 Achievable Rate Region

and R is limited by 1/2R−→(β). For β the MAC sum-rate restriction limits the sum- 1 R2 ∈ IΣ rate R + R 1/2RMAC. If β , the unidirectional rates R and R are limited by 1 2 ≤ Σ ∈ IBC 1 2 1/2R−→(β) and 1/2R−→(1 β), i.e. the broadcast is the limiting phase. Finally, is not R2 R1 − RBReq restricted by a certain constraint if the corresponding set is empty, e.g. if = the whole IBC ∅ MAC region can be supported in the BC phase, i.e. = 1/2 . RBReq CMAC Thus, as a direct consequence of the theorem, the following corollary characterizes the achievable rate region for a given relay power distribution parameter β [0, 1]. ∈ Corollary 2.6. For bidirectional relaying with equal time division the achievable bidirec- tional rate region BReq(β) for a given relay power distribution parameter β [0, 1] is given by R ∈

2 R Ê −→ −→ if + : R1 R1R, R2 RR1(1 β) , β 1, ∈ 2 ≤ ≤ − ∈ I R Ê : R R−→(β), R R−→ , if β ,  ∈ + 1 ≤ R2 2 ≤ 2R ∈ I2 1  2 (β)= R Ê : R R−→(β), R R−→(1 β) , if β , BReq  + 1 R2 2 R1 BC R 2  ∈ ≤ ≤ − ∈ I  R R−→(β), R R−→(1 β),  2 1 R2 2 R1 R Ê if + : ≤ ≤ MAC− , β Σ. ( ∈ R1 + R2 RΣ ) ∈ I  ≤   For β 1 2 BC the rate region BReq(β) is a rectangular, which is characterized by two individual∈ I ∪ I rate∪ I constraints. For thoseR relay power distributions the upper right vertex of the rate region characterizes a boundary rate pair of BReq. If β Σ, the MAC sum-rate constraint has additionally to be satisfied. For thoseR relay power distributions∈ I the sum-rate constraint of the MAC phase restricts the achievable rate region . RBReq In the next corollary we characterize the minimal relay power respectively signal-to-noise M M ratio which is necessary to support a rate pair [R1 , R2 ] MAC that achieves the maximal M M MAC ∈ C MAC sum-rate, i.e. R1 + R2 = RΣ . Corollary 2.7. For bidirectional relaying with equal time division the minimal signal-to- M M noise ratio to support in the BC phase a rate pair [R1 , R2 ] MAC that achieves the MAC ∈ C maximal possible sum-rate RΣ is given by Σ ⋆ Σ1 Σ1 2Σ 2Σ γ MAC = max γ , min γˆ ,γ (1/2) , min γˆ ,γ (1/2) (2.16) R R { R R } { R R } 2Σ 1 Σ1 1 with γR ( /2) and γR ( /2) according to Proposition 2.3. and 1+ γ h 2 + γ h 2 1 1 γ⋆ := 2 1| 1| 2| 2| , R h 2 h 2 − h 2 − h 2 s | 1| | 2| | 1| | 2| 2γ h 2 1 1 γˆΣ1 := 2| 2| + , R (1 + γ h 2) h 2 h 2 − h 2 1| 1| | 1| | 1| | 2| 2γ h 2 1 1 γˆ2Σ := 1| 1| + . R (1 + γ h 2) h 2 h 2 − h 2 2| 2| | 2| | 2| | 1|

31 2 Bidirectional Relay Communication using Superposition Encoding

Proof. The proof can be found in Appendix 2.8.4.

ΣMAC Σ1 Σ1 1 2Σ 2Σ 1 The case where γR is equal to min γˆR ,γR ( /2) or min γˆR ,γR ( /2) corresponds { } { MAC} to the case when the vertex νΣ1 or ν2Σ is the rate pair where the sum-rate RΣ is achieved with the minimal γR. This is only the case when either the sum-rate optimal rate pair of the ⋆ ⋆ broadcast phase [R−→, R−→] coincides with the vertex itself or it cannot be supported in the R2 R1 ⋆ ⋆ MAC phase, i.e. 1/2[R−→, R−→] / BReq. R2 R1 ∈ R

ΣMAC If γR γR , the maximal achievable bidirectional sum-rate is limited by the MAC sum-rate≥ constraint. Accordingly, the maximal achievable bidirectional sum-rate is equal 1 MAC to /2RΣ . The set of sum-rate optimal bidirectional rate pairs is given by

∗ := [R , R ] 1 MAC : β so that R 1 R−→(β), R 1 R−→(β) RΣeq 1 2 ∈ 2 RΣ ∃ ∈ IΣ 1 ≤ 2 R2 2 ≤ 2 R1 n o = [R , 1 RMAC R ] : 1 R−→(βmin ) R 1 R−→(βmax) (2.17) 1 2 Σ − 1 2 R2 Sum ≤ 1 ≤ 2 R2 Sum n o min max with βSum := minβ∈IΣ β and βSum := maxβ∈IΣ β. In the next corollary we characterize ΣMAC the rate pairs where the maximal achievable sum-rate is attained if we have γR <γR .

ΣMAC Corollary 2.8. For bidirectional relaying with equal time division and γR <γR the rate pair which achieves the bidirectional sum-rate maximum is given by

R (0), if γ min γ† ,γ2B , (2.18a) BC R ≤ { R R } R (β ), if γ >γ2B γ γ⋆1, (2.18b)  BC 2B R R ∧ R ≥ R ⋆ † ⋆1 2⋆ RΣ := arg max R1 + R2 =  R (β ), if γ <γ < min γ ,γ , (2.18c)  BC R R R R [R1,R2]∈RBReq  | | { }  R (β ), if γ >γB1 γ γ2⋆, (2.18d) BC B1 R R ∧ R ≥ R † B1  RBC(1), if γR min γR,γR (2.18e)  ≤ {− }  with characteristic parameters 

1 1 γ h 2 γ h 2 γ† := , γB1 := 1| 1| , γ2B := 2| 2| , R h 2 − h 2 R h 2 R h 2 | 2| | 1| | 2| | 1| 2γ h 2 1 1 2γ h 2 1 1 γ⋆1 := 2| 2| + , and γ2⋆ := 1| 1| + . R h 2 h 2 − h 2 R h 2 h 2 − h 2 | 1| | 1| | 2| | 2| | 2| | 1|

Proof. The proof can be found in Appendix 2.8.5.

In the following remark we just restate the interesting observation where it is sum-rate opti- mal not to apply the bidirectional protocol.

32 2.2 Achievable Rate Region

Remark 2.9. If we have γ min γ† ,γB1 , it is sum-rate optimal to communicate only R ≤ {− R R } from node 1 to node 2. Therefore, for γ† 0 it is necessary that we have h 2 h 2. − R ≥ | 2| ≥ | 1| Similarly, if we have γ min γ† ,γ2B , it is sum-rate optimal to communicate only from R ≤ { R R } node 2 to node 1. For this case it is necessary that we have h 2 h 2. | 1| ≥| 2|

The knowledge about the combinatoric allows us to characterize the boundary of the achiev- ∗ able rate region BReq directly. Let Req(q) denote the rate pair where the weighted rate R 2 sum with weight vector q =[q , q ] Ê 0 is maximized, 1 2 ∈ + \ { } ∗ Req(q) = arg max q1R1 + q2R2. (2.19) R∈RBReq

∗ The rate pair Req(q) plays a crucial role for the throughput optimal resource allocation policy in Section 2.3 and for the relay selection problem in Section 2.4. For a convex set like ∗ BReq the rate pair Req(q) characterizes the rate pair on the boundary of BReq where the tangentialR hyperplane with normal vector q intersects the boundary of R , i.e. the rate RBReq pairs with the maximal weighted rate sum characterize the boundary of BReq. This gives us an equivalent description of the achievable rate region using the convexR hull operator

∗ 2 = co R (q): q =[q , q ] Ê 0 0 . RBReq eq 1 2 ∈ + \ { } ∪    In the next theorem we give a closed form solution of the optimization problem given in equation (2.19).

Theorem 2.10. For bidirectional relaying with equal time division the weighted rate sum ∗ 2 maximum R (q) for a weight vector q =[q , q ] Ê 0 is given by eq 1 2 ∈ + \ { } R (1), if β > 1 q q ϑ(1), (2.20a) BC B1 ∧ 2 ≤ 1 R (0), if β < 0 q q ϑ(0), (2.20b)  BC 2B ∧ 2 ≥ 1  νΣ1, if βΣ1 βB1 q2 q1, (2.20c)  ≥ ∧ ≤   ν2Σ, if β2Σ β2B q2 q1, (2.20d)  ≤ ∧ ≥  RBC(βB1), if βΣ1 <βB1 1 q2 q1ϑ(βB1), (2.20e) 1  ≤ ∧ ≤ R∗ (q)=  eq 2  RBC(β2B), if 0 β2B <β2Σ q2 q1ϑ(β2B), (2.20f)  ⋆≤2 ∧ ≥  if β > ∆β β2Σ <βBΣ <βΣ1 RBC(βBΣ), ∧ (2.20g) q ϑ(β ) q q ,  ∧ 1 BΣ ≤ 2 ≤ 1  ⋆2  if β > ∆β β2Σ <βΣB <βΣ1  RBC(βΣB), ∧ (2.20h)  q ϑ(β ) q q ,  1 ΣB 2 1  ∧ ≥ ≥  RBC(βBC), else, (2.20i)   

33 2 Bidirectional Relay Communication using Superposition Encoding with

2 2 h2 (1 + (1 β)γR h1 )

Ê and ϑ : [0, 1] , β | | 2 − |2 | , (2.21a) → 7→ h1 (1 + βγR h2 ) | 2| | 2 | 2

2 q1 h2 (1 + γR h1 ) q2 h1 Ê β : Ê 0 , q | | | | − | | . (2.21b) BC + \ { } → 7→ h 2 h 2γ (q + q ) | 2| | 1| R 1 2

Proof. The proof can be found in Appendix 2.8.6.

The function ϑ(β) denotes the arctan of the angle of the normal vector of the rate pair on the boundary R (β) for the relay power distribution β [0, 1]. Further, β (q) is the relay BC ∈ BC power distribution where the angle of the normal vector of the rate pair on the boundary of has the same angle as the weight vector q. Since the optimization problem depends on RBC the direction of the normal vector only, the weighted rate sum maximum is attained at the same rate pair for any weight vector with the same ratio q1/q2. This means that only the angle of the weight vector is important. The cases (2.20a) to (2.20h) denote the rate pairs where on the boundary two restrictions apply simultaneously. Such rate pairs correspond to intersection points which have multiple tangents so that they are optimal for a range of weight vector angles. In contrast, the rate pair of the case (2.20i) is optimal for one weight vector angle only.

In more detail, the cases (2.20a) and (2.20b) characterize the intersection of the boundary of 1 with the -axis and -axis respectively. The individual MAC rate constraint −→ 2 BC R1 R2 R1R limitsR the achievable rate region in the cases (2.20e) and (2.20c), while for the latter RBReq we additionally have ν . Similarly, −→ limits in the cases (2.20f) and Σ1 BC R2R BReq (2.20d), while for the latter∈ we R additionally have ν R . We have the cases (2.20g) 2Σ ∈ RBC and (2.20h) if the MAC sum-rate constraint RMAC limits and the boundary of Σ RBReq RBC intersects the section between the vertices νΣ1 and ν2Σ.

The theorem also covers some special cases. If we choose q1 = q2 = 1, we have the sum-rate maximum maxR∈RBReq R1 + R2 case, which we also studied in Corollary 2.8 for γ γΣMAC . From this the question arises if the sum-rate maximum is Schur-convex or R ≤ R Schur-concave with respect to the receive signal-to-noise ratios [γ h 2,γ h 2]. But from 1| 1| 2| 2| the examples of Figure 2.3 we see that there is no such behavior. If the sum-rate maximum is determined by the individual rate constraints of the MAC phase, −→ or −→, i.e. at R1R R2R βB1 or β2B, the sum-rate increases with more balanced receive signal-to-noise ratios, which is a Schur-concave behavior. But if the maximum sum-rate is restricted by the broadcast phase or MAC sum-rate constraint, i.e. at βBC or βSum, and the receive signal-to-noise ratios are relatively balanced, we see an oppositional behavior. Nevertheless, this shows that more or less balanced receive signal-to-noise ratios result in large sum-rates.

34 2.2 Achievable Rate Region

3 γ =1 3 γ =0.4 0.4 1 1.2 1 0.6 γ =1 0.4 γ =1.1 0.6 2 2 2.5 γ =0.5 2.5 γ =0.9 0.1 0.5 R R

0.3 β 0.7 B1

0.2 β β 2 BC 2 1 Sum

β 0.2 B1 2 2 0.8 γ γ 2 2

| 0.6 |

2 1.5 2 1.5 0.4 |h |h 1 0.5 β BC 1 1 0.6 1 0.4 0.3 β 0.8 2B β 0.6 0.5 0.1 0 2B 0.4 0.5 0.2 0.3 0.4 0.2 0.1 0.2 0.2 0 0 0 0.5 1 1.5 2 2.5 3 0 0.5 1 1.5 2 2.5 3 |h |2γ |h |2γ 1 1 1 1 (a) Symmetric MAC power (b) Asymmetric MAC power

Figure 2.3: Contour plot of sum-rate maximum with optimal relay power distribution regions (βSum denotes the case where the MAC sum-rate constraint limits the maximal sum-rate). The cases of the sum-rate optimal relay power distribution are due to the combinatoric of the boundary of . RBReq

On the other hand, if we choose either q1 > 0, q2 = 0 or q1 = 0, q2 > 0, we get the maximal ∗ ∗ unidirectional rates R1eq and R2eq, i.e. we maximize R1 or R2 only. This is obviously achieved if we choose β1 = 1 or β2 = 1 respectively:

∗ 1 2 2 R1eq := max R1 = 2 log 1 + min γ1 h1 ,γR h2 , (2.22a) [R1,R2]∈RBReq { | | | | } ∗ 1 2 2  R2eq := max R2 = 2 log 1 + min γ2 h2 ,γR h1 . (2.22b) [R1,R2]∈RBReq { | | | | } 

If we maximize , the rate need not be zero. In more detail, if −→ −→ , all R1 R2 R1R < RR2(1) rate pairs in ∗ ∗ 1 −→ achieve the maximal 1eq := [R1eq, R2] : 0 R2 2 RR1(1 β1B) R ∗ { ≤ ≤ − } unidirectional rate R1eq. Similarly, if we maximize R2, the rate R1 need not be zero. If −→ −→ , all rate pairs in ∗ ∗ 1 −→ achieve the R2R < RR1(1) 2eq := [R1, R2eq] : 0 R1 2 RR2(βB2) ∗ R { ≤ ≤ } maximal unidirectional rate R2eq.

Optimal time division

We now study bidirectional relaying with optimal time division between the phases. There- fore, we identify the optimal time division and relay power distribution for an optimal rate allocation, which allows us to characterize the boundary of the bidirectional achievable rate

35 2 Bidirectional Relay Communication using Superposition Encoding

region BRopt. For that goal, we first specify the optimal time division and relay power distributionR for a fixed operating rate pair in the MAC phase. After that we use this to derive an equivalent description of the set . RBRopt In the next lemma, we characterize for any operating rate pair [RM , RM ] in the 1 2 ∈ CMAC MAC phase the corresponding optimal rate pair in the BC phase and the optimal time division α∗. It shows that the optimal rate pair is on the boundary of (1 α∗) . Since for any rate − RBC pair on the boundary of we have β + β = 1, we have to find the optimal relay power RBC 1 2 distribution β∗ [0, 1] with β = β∗ and β = 1 β∗. ∈ 1 2 − M M Lemma 2.11. For an arbitrary but fixed rate pair [R1 , R2 ] MAC the feasible set of M∈ CM time division parameters, where operating at the rate pair [R1 , R2 ] in the MAC phase is possible, is given by

= α [0, 1] : there exists a relay power distribution [β ,β ] with A ∈ 1 2 ∈ B αRM (1 α)R−→(β ), αRM (1 α)R−→(β )  1 ≤ − R2 1 2 ≤ − R1 2 with simplex = [β ,β ] [0, 1] [0, 1] : β + β 1 . For a time division parameter B { 1 2 ∈ × 1 2 ≤ } α we achieve the bidirectional rate pair [R , R ] = α[RM , RM ]. Then the optimal ∈ A 1 2 1 2 time division parameter α∗ := max α is uniquely characterized by the equations α∈A

α∗RM = (1 α∗)R−→(β∗), (2.23a) 1 − R2 α∗RM = (1 α∗)R−→(1 β∗), (2.23b) 2 − R1 − which also characterizes the optimal relay power distribution [β∗,β∗] with β∗ = β∗ 1 2 ∈ B 1 and β∗ = 1 β∗. 2 − Proof. The proof can be found in Appendix 2.8.7.

The equations (2.23a) and (2.23b) characterize the optimal time division and relay power M M ⋆ M distribution for any rate pair [R1 , R2 ] MAC. Obviously, β = 1 is optimal if R2 is M ∈ C equal to zero. For any positive rate R2 the ratio RM R−→(β∗) 1 = R2 (2.24) RM R−→(1 β∗) 2 R1 − ∗ ∗ ∗ ∗ implicitly defines the optimal relay power distribution β [0, 1) with β1 = β and β2 = ∗ ∗ ∗ ∈ 1 β so that [β1 ,β2 ] . With the optimal relay power distribution we can calculate the optimal− time division coefficient∈ B

R−→(β∗) R−→(1 β∗) α∗ = R2 = R1 − . RM + R−→(β∗) RM + R−→(1 β∗) 1 R2 2 R1 −

36 2.2 Achievable Rate Region

M M If we do not have R1 = 0 and R2 = 0 at the same time, the system of equations (2.23a) and (2.23b) has only one solution. It follows that the optimal parameters are unique. Equation (2.24) shows that for any [RM , RM ] with the same ratio we have the 1 2 ∈ CMAC same optimal relay power distribution. Furthermore, the resulting bidirectional rate pair [R , R ] has the same ratio as the rate pair [RM , RM ] . This means that 1 2 ∈ RBRopt 1 2 ∈ CMAC all lie on the same radial line. Then it is clear that for the optimal time division the bound- aries of the scaled MAC and BC regions intersect, which we can observe in Figure 2.2 (b). Furthermore, it follows that the largest bidirectional rates with a certain ratio are achieved by the rate pairs on the boundaries of the MAC and of the BC region with the same ratio. This holds for any ratio and therefore for any rate pair on the boundary. With this we can find an equivalent characterization of by transforming the rate pairs of sum and individual RBRopt rate constraints of the MAC region using Lemma 2.11.

Theorem 2.12. The bidirectional achievable rate region with optimal time division BRopt is given by R

= (2.25) RBRopt R1 ∩ R2 ∩ RΣ with rate regions

2 := R Ê : R R (β), R R (β), β [0, 1] , R1 ∈ + 1 ≤ 11 2 ≤ 12 ∈ 2 := R Ê : R R (β), R R (β), β [0, 1] , R2  ∈ + 1 ≤ 21 2 ≤ 22 ∈ 2 := R Ê : R R (β), R R (β), β [0, 1] , RΣ  ∈ + 1 ≤ Σ1 2 ≤ Σ2 ∈  rate constraints R , R , R , R , R , R : [0, 1] Ê with 11 12 21 22 Σ1 Σ2 → + −→ −→ ⋆ R1RRR2(β) R11 : β 1 α1(β) R−→(β)= , (2.26a) R2 −→ −→ 7→ − R1R + RR2(β)  −→ −→ ⋆ R1RRR1(1 β) R12 : β 1 α1(β) R−→(1 β)= − , (2.26b) R1 −→ −→ 7→ − − R1R + RR2(β)  −→ −→ ⋆ R2RRR2(β) R21 : β 1 α2(β) R−→(β)= , (2.26c) 7→ − R2 R−→ + R−→(1 β) 2R R1 −  −→ −→ ⋆ R2RRR1(1 β) R22 : β 1 α2(β) R−→(1 β)= − , (2.26d) 7→ − R1 − R−→ + R−→(1 β) 2R R1 −  MAC −→ ⋆ RΣ RR2(β) RΣ1 : β 1 αΣ(β) R−→(β)= , (2.26e) 7→ − R2 RMAC + R−→(1 β)+ R−→(β) Σ R1 − R2  MAC −→ ⋆ RΣ RR1(1 β) RΣ2 : β 1 αΣ(β) R−→(1 β)= − , (2.26f) 7→ − R1 − MAC −→ −→ RΣ + RR1(1 β)+ RR2(β)  −

37 2 Bidirectional Relay Communication using Superposition Encoding and optimal time division parameters

−→ ∗ RR2(β) α1 : [0, 1] Ê+, β , (2.27a) −→ −→ → 7→ R1R + RR2(β) −→ ∗ RR1(1 β) α2 : [0, 1] Ê+, β − , (2.27b) → 7→ R−→ + R−→(1 β) 2R R1 − −→ −→ ∗ RR1(1 β)+ RR2(β) αΣ : [0, 1] Ê+, β − . (2.27c) → 7→ RMAC + R−→(1 β)+ R−→(β) Σ R1 − R2

Proof. The proof can be found in Appendix 2.8.8.

From the inspection of the equivalent characterization of the rate region we find that the information flows show a similar behavior as Kirchhoff’s first law (the principle of con- servation of electric charge). Here, the conservation of the information flows is due to the superposition encoding approach. In Figure 2.4 (a) we illustrate the regions , 1/2 , RΣ RBC and 1/2 MAC. We see that the intersection point of 1/2RΣ and 1/2 BC represents the bound- ary rateR pair on for the equal time division case. It is easy to conceiveR that for other time RΣ division parameters α the intersection point moves on the boundary according to the scaled rate region (1 α) and sum-rate constraint αR of α . Similar arguments apply − RBC Σ RMAC to 1 and 2. Then in Figure 2.4 (b) we illustrate the construction of BRopt using the intersectionR R of the sets , , and according to Theorem 2.12. R R1 R2 RΣ For the throughput optimal resource allocation policy in Section 2.3 and for the relay selec- tion problem in Section 2.4 we need to identify the angle of the normal vector of any Pareto optimal rate pair on the boundary of . In the next corollary we characterize the bound- RBRopt aries of 1, 2, and Σ. Since the boundaries on the axis are obvious, we parametrized the boundariesR inR the firstR quadrant only. This also characterizes for each boundary rate pair on ⋆ ⋆ BRopt the optimal relay power distribution with β1 = β and β2 = 1 β. The parametriza- Rtion of the boundary allows us to identify properties of the normal vectors− on the boundaries from which we can conclude that 1, 2, and Σ are convex. Then it follows that BRopt is convex as well. Hence, the nextR corollaryR isR essential for the discussion of the weightedR rate sum maximization problem considered in Theorem 2.16.

Corollary 2.13. We can parametrize the boundaries of 1, 2, Σ by the rate pair func- tions R R R

2 R : [0, 1] Ê , β [R (β), R (β)], 1 → + 7→ 11 12 2 R : [0, 1] Ê , β [R (β), R (β)], 2 → + 7→ 21 22 2 R : [0, 1] Ê , β [R (β), R (β)], Σ → + 7→ Σ1 Σ2

38 2.2 Achievable Rate Region

|h |2 =0.9 1.2 |h |2 =0.9 0.6 1 1 |h |2 =0.3 |h |2 =0.3 2 2 γ =1 γ =1 1 1 γ =1.3 γ =1.3 [bit/channel use] 2 [bit/channel use] 0.8 2 0.4 γ =1.7 γ =1.7 R 2 2 R rate R rate R 0.2 0.4

0 0 0 0.2 0.4 0.6 0 0.2 0.4 0.6 rate R [bit/channel use] rate R [bit/channel use] 1 1

(a) Achievable rate regions RΣ (solid line), (b) Achievable rate region RBRopt (solid line) 1 1 /2RBC (dotted line), /2CMAC (dashed line), after intersection of R1 (dashed line), RΣ 1 MAC and MAC sum-rate constraint /2RΣ (dashed-dotted line), and R2 (dotted line). (dashed-dotted line).

Figure 2.4: Equivalent characterization of the bidirectional achievable rate region BRopt for the optimal time division case using , , and . R R1 R2 RΣ respectively. Therewith, the angles of the normal vectors for any boundary rate pair of 1, , and are given by the strictly decreasing functions R R2 RΣ

dR11(β) dβ ϕ1 : [0, 1] [0, π/2], β arctan , → 7→ − dR12(β) dβ    dR21(β)dβ ϕ2 : [0, 1] [0, π/2], β arctan , → 7→ − dR22(β) dβ    dRΣ1(β) dβ ϕΣ : [0, 1] [0, π/2], β arctan , → 7→ − dRΣ2(β) dβ    respectively. It follows that is convex.  RBRopt

Proof. The proof can be found in Appendix 2.8.9.

Since ϕ1, ϕ2, and ϕΣ are continuous and strictly decreasing for each function, there exists an inverse function ϕ−1 : [ϕ (1),ϕ (0)] [0, 1], ϕ−1 : [ϕ (1),ϕ (0)] [0, 1], and 1 1 1 → 2 2 2 → ϕ−1 : [ϕ (1),ϕ (0)] [0, 1] respectively. Unfortunately, ϕ−1, ϕ−2, and ϕ−1 have no Σ Σ Σ → 1 2 Σ explicit representation.

39 2 Bidirectional Relay Communication using Superposition Encoding

For a complete characterization of the boundary of BRopt we need to understand the com- binatoric of the intersection (2.25). In the next propositionR we see that also the combinatoric of the MAC region carries over to . RBRopt Proposition 2.14. In the first quadrant there is exactly one intersection between the bound- aries of and , and , and and . In particular, for each intersection R1 R2 R1 RΣ R2 RΣ there exists exactly one relay power distributions β ,β ,β [0, 1] where we have 12 1Σ Σ2 ∈ R (β ) = R (β ) / , R (β ) = R (β ) , and R (β ) = 1 12 2 12 ∈ RBRopt 1 1Σ Σ 1Σ ∈ RBRopt 2 Σ2 R (β ) , where the last two rate pairs are the transformed vertices ν and Σ Σ2 ∈ RBRopt 1Σ νΣ2 respectively. Furthermore, we have

R (1) R (1) R (1), (2.28a) 11 ≤ Σ1 ≤ 21 R (0) R (0) R (0). (2.28b) 12 ≤ Σ2 ≤ 22 Proof. The proof can be found in Appendix 2.8.10.

With the equivalent description of the rate region and the knowledge about the combinatoric it is finally easy to characterize the boundary of . RBRopt 2 Corollary 2.15. The section-wise defined rate pair function R : [0, 1] Ê with opt → + R (β), for β β 0, 2 Σ2 ≥ ≥ R : β R (β), for β >β>β , (2.29) opt 7→  Σ 1Σ Σ2 R (β), for 1 β β . 1 ≥ ≥ 1Σ  characterizes the boundary of the bidirectional achievable rate region BRopt for the opti- mal time division case. R

Proof. The proof can be found in Appendix 2.8.11.

We are now ready to characterize in closed form the rate pair where the weighted rate sum is maximized. For that goal we make use of all previously introduced functions and char- acteristic parameters for the rate region in the next theorem. Remember that for an RBRopt optimal relay power distribution we have β∗ = 1 β∗ = β∗. 1 − 2 2 Theorem 2.16. Let q = [q , q ] Ê 0 denote a weight vector with nonnegative 1 2 ∈ + \ { } q1 elements and angle θq := arccos 2 2 , then the rate pair where the weighted rate sum √q1 +q2 is maximized is given as  

∗ ∗ Ropt(q) = arg max q1R1 + q2R2 = Ropt(β (q)) (2.30) R∈RBRopt

40 2.2 Achievable Rate Region

|h |2 =0.6 |h |2 =0.6 1 1 0.6 |h |2 =0.9 0.6 |h |2 =0.9 2 2 γ =1 γ =1 1 1 γ =1 γ =1 2 2 γ =1.7 γ =1.7 R R [bit/channel use] 0.4 [bit/channel use] 0.4 2 2 rate R rate R 0.2 0.2

0 0 0 0.2 0.4 0.6 0 0.2 0.4 0.6 rate R [bit/channel use] rate R [bit/channel use] 1 1

(a) Equal time division: RBReq (solid line), (b) Optimal time division: RBRopt (solid line), 1 1 /2CMAC and /2RBC (dotted lines) R1, R2, and RΣ (dotted lines)

Figure 2.5: Bidirectional achievable rate regions with Pareto optimal rate pairs. with the optimal power distribution parameter β∗(q) defined by

1, if θq <ϕ1(1), −1 ϕ (θq), if ϕ (1) θq ϕ (β ),  1 1 ≤ ≤ 1 1Σ β , if ϕ (β ) < θ <ϕ (β ),  1Σ 1 1Σ q Σ 1Σ ∗ 2  −1 β : Ê [0, 1], q ϕ (θq), if ϕ (β ) θq ϕ (β ), + → 7→  Σ Σ 1Σ ≤ ≤ Σ Σ2  βΣ2, if ϕΣ(βΣ2) < θq <ϕ2(βΣ2), −1 ϕ (θq), if ϕ (β ) θq ϕ (0),  2 2 Σ2 ≤ ≤ 2  0, if ϕ2(0) < θq.   Then the corresponding optimal time division parameter α∗(q) is given by

∗ ∗ α1(β (q)), if 1 β (q) β1Σ, ∗ 2 ∗ ≥ ∗ ≥ α : Ê [0, 1], q α (β (q)), if β >β (q) >β , + → 7→  Σ 1Σ Σ2 α (β∗(q)), if β β∗(q) 0. 2 Σ2 ≥ ≥  Proof. The proof can be found in Appendix 2.8.12.

In Figure 2.5 we depicted the bidirectional rate regions with equal (a) and optimal (b) time division. The marked boundary rate pairs (bullets) denote the weighted rate sum optimal rate pairs for the corresponding vector (arrows). We see that the intersection points are optimal

41 2 Bidirectional Relay Communication using Superposition Encoding for a range of weight vectors, while the rate pairs between intersection points correspond to exactly one orthonormal vector.

As for the equal time division the theorem covers some special cases. If we choose q1 = q2 = 1, we get the sum-rate optimal rate pair. On the other hand, we maximize the unidirectional ∗ rate R1 if we choose q1 > 0 and q2 = 0 so that we have θq = 0. Obviously, β = 1 is the optimal power distribution with the corresponding optimal rate pair Ropt(1) = R1(1) = [R11(1), R12(1)]. This means that the maximal unidirectional rate for the optimal time division case is given by

−→ −→ ∗ R1RRR2(1) R1opt := max R1 = R11(1) = . (2.31a) [R ,R ]∈R −→ −→ 1 2 BRopt R1R + RR2(1)

∗ Similarly, if we choose q1 = 0 and q2 > 0, we have θq = π/2 so that β = 0 is optimal. From the corresponding optimal rate pair Ropt(0) = R2(0) = [R21(0), R22(0)] we get the other maximal unidirectional rate as follows

−→ −→ ∗ R2RRR1(1) R2opt := max R2 = R22(0) = . (2.31b) [R ,R ]∈R −→ −→ 1 2 BRopt R2R + RR1(1)

Since we have R12(1) = R22(0) = 0, for the optimal time division the maximal unidirec- tional rate pairs are always on the R1-axis and R2-axis. In the next section we will derive the achievable rate region with an optimal time-division but with a different interpretation of the block length of a code word which result in a different individual power constraint which depends on the time-division parameter.

2.2.5 Achievable Rate Regions with Power Scaling

In this section we briefly want to discuss a different interpretation of the mean power con- straint assumed in the remaining sections. A more detailed discussion on the fundamentals of the following discussion can be found in [Gal68], but it is also addressed in other text- books like [Ash65] or [CT91]. In this chapter we consider Gaussian channels, which are continuous-alphabet channels. In order to have useful results it is necessary to consider an input constraint, which is usually characterized by a real-valued function f(x) on the input letters.

The most common and physically meaningful constraint is an energy constraint per transmit- ted symbol, i.e. f(x)= x 2. It is common to consider an equivalent power constraint, where one has normalized the energy| | constraint by the time duration of a symbol. This means that we are usually faced with a mean power constraint P .

42 2.2 Achievable Rate Region

But we still have to interpret the constraint per input symbol from a coding point of view. Let xm = [xm,1,xm,2,...,xm,N ] denote a code word of length N, then it is common and reasonable to insist that each code word xm satisfies the condition

N N f(x )= x 2 NP. (2.32) m,n | m,n| ≤ n=1 n=1 X X Using the random coding arguments we consider the input as a random variable X. Accord- ingly, it is usual to bound the expected value of f(X) so that (2.32) results in the commonly used mean power constraint 2 E X P. {| | }≤ The difference between the results obtained in this section and the remaining ones of this chapter is the interpretation of the definition of a code word. Since the relay node cannot transmit and receive at the same time using the same frequency we require orthogonal chan- nels for the transmission and reception. As a consequence the communication is performed in two phases. In this work we consider orthogonal channels in the time domain, but the concepts and the results of this section also hold for orthogonal channels in the frequency domain where we split the total bandwidth into two channels. The time division between the two phases mean that in the first NMAC time slots we are in the MAC phase. In the following NBC time slots we are in the BC phase. In the remaining of this chapter we have defined input power constraints per transmitted symbol for each phase individually, which means that the code word in the MAC phase has the length NMAC and the codeword in the BC phase has the length NBC. However, in this section we will assume that the code words in the MAC and BC phase have the length NBC + NMAC. To be conform to the time division between the phases we have to assume that in the MAC phase the last NBC letters of the code words are equal to zero and in the BC phase the first NMAC letters of the code words are equal to zero. Accordingly, for a code word in the MAC phase we have

NMAC+NBC NMAC x 2 = x 2 (N + N )P. | m,n| | m,n| ≤ MAC BC n=1 n=1 X X 2 NMAC+NBC which results in the scaled power constraint E X P . Similarly, for a NMAC codeword in the BC phase we have {| | } ≤

NMAC+NBC NMAC+NBC x 2 = x 2 (N + N )P. | m,n| | m,n| ≤ MAC BC n=1 X n=NXMAC+1 2 NMAC+NBC which results in the scaled power constraint E X P . We see that we scale {| | }≤ NBC the power constraints with respect to the time division. Let α denote the ratio of NMAC

43 2 Bidirectional Relay Communication using Superposition Encoding

to NMAC + NBC = N as N gets large. Then we end up with the individual mean power constraints P P P P˜ := 1 , P˜ := 2 , and P˜ := R (2.33) 1 α 2 α R 1 α − of the nodes 1 and 2 in the MAC phase and the relay node in the BC phase. For that reason we consider this as bidirectional relaying with scaled powers. From (2.33) we see that this model has the property that for each phase the mean transmit power constraint gets arbitrary large if the time period of the phase is correspondingly short. However, the provided energy for each node is independent of the duration of the phases, i.e. the energy remains constant for different time division parameters.

This interpretation of the code word length is often assumed for the multiple access chan- nel with orthogonal access (TDMA or FDMA) [CT91] and for Gaussian orthogonal relay channels in [LV05]. In the following we derive the achievable rate region of bidirectional re- laying with optimal time division and scaled powers. Fortunately, we can principally follow the same ideas as before, although the proofs get more involved because of the non-linear dependence of the time division parameter on the achievable rate constraints. This also ham- pers closed form solutions. Accordingly, in the next sections we specify the achievable rate region of the MAC phase, the BC phase, and the achievable rate region obtained with optimal time division between the two phases.

Since all concepts of the previous section can be transfered, the symbols will have the same meaning but in a different context. For that reason we only added a tilde to the previously defined symbols to distinguish the variables and results of this section from the results of the remaining chapter. To avoid distracting case studies we exclude for notational convenience the degenerate case where one channel or power is equal to zero. However, there is no mathematical difficulty to extend the discussion for these cases.

Multiple Access Phase

In the multiple access phase node 1 and node 2 transmit their messages to the relay node. We assume that for the fraction α (0, 1] we are in the MAC phase, which specifies the ∈ effective block length of the code words. Then we assume that the relay node can decode the message of node 1 with rate R1 and the message of node 2 with rate R2 if the rate pair is within the capacity region

˜ 2 ˜ ˜ ˜MAC (α) := [R , R ] Ê : R R−→(α), R R−→(α), R + R R (α) CMAC 1 2 ∈ + 1 ≤ 1R 2 ≤ 2R 1 2 ≤ Σ n o

44 2.2 Achievable Rate Region with the individual and sum-rate constraints

2 ˜ γ1 h1 R−→ : (0, 1] Ê , α α log 1+ | | , (2.34a) 1R → + 7→ α   2 ˜ γ2 h2 R−→ : (0, 1] Ê , α α log 1+ | | , (2.34b) 2R → + 7→ α   2 2 ˜MAC γ1 h1 + γ2 h2 R : (0, 1] Ê , α α log 1+ | | | | , (2.34c) Σ → + 7→ α   and the continuously continuations R˜−→(0) := 0, k = 1, 2, and R˜MAC(0) := 0. The kR Σ difference to the rate constraints (2.4a), (2.4b), and (2.4c) of the previous model is that here the powers, respectively signal-to-noise ratios γ1 and γ2, are divided by the time division factor α. For α = 0 the protocol degenerates and there is no multiple access phase so that we have ˜ (0) = . It follows that for α = 0 no bidirectional communication will be CMAC ∅ possible. Therefore, we exclude the case α = 0 to avoid distracting case studies caused by divisions by α.

For any fixed time division parameter α (0, 1] the capacity region ˜MAC(α) describes a pentagon, which is obviously convex. In the∈ next lemma we prove monotonyC and concavity properties of the rate constraints, which we will extensively use in the proofs for the results on the bidirectional achievable rate region.

Lemma 2.17. The individual and sum-rate constraint functions ˜−→ , ˜−→ , and R1R(α) R2R(α) R˜MAC(α) are strictly increasing and concave for α (0, 1]. Σ ∈ Proof. The proof can be found in Appendix 2.8.13.

Broadcast Phase

In the broadcast phase the relay node re-encodes the decoded messages from the MAC phase. Then the relay node scales the code word of the message of node 1 with rate R1 and the code word of the message of node 2 with rate R2 according to the relay power constraint. Again the parameter β [0, 1] denotes the fraction of the relay power spent for the message of node ∈ 1. Then the relay node transmits a superposition of the scaled codewords. Node 1 and node 2 subtract the interference caused by the code word of its own message before decoding the unknown message. Therefore, we can assume that node 2 and node 1 can decode the messages if the rate pair [R1, R2] is within the achievable rate region

˜ 2 (α) := [R , R ] Ê : there exists β [0, 1] such that RBC 1 2 ∈ + ∈ n R R˜−→(α,β), R R˜−→(α,β) 1 ≤ R2 2 ≤ R1 o

45 2 Bidirectional Relay Communication using Superposition Encoding with rate constraints 2 ˜ γRβ h2 R−→ : [0, 1) [0, 1] Ê , [α,β] (1 α) log 1+ | | , (2.35a) R2 × → + 7→ − 1 α   − 2 ˜ γR(1 β) h1 R−→ : [0, 1) [0, 1] Ê , [α,β] (1 α) log 1+ − | | , (2.35b) R1 × → + 7→ − 1 α  −  and with the continuously continuation R˜−→(1,β) := 0, k = 1, 2, for all β [0, 1]. The Rk ∈ difference to rate constraints (2.7a) and (2.7b) of the previous model is that here the power, respectively signal-to-noise ratio γ , is divided by the time division factor (1 α). For α = 1 R − the protocol degenerates and there is no broadcast phase so that we have ˜ (1) = . It RBC ∅ follows that for α = 1 no bidirectional communication will be possible so that we exclude the case α = 1 to avoid distracting case studies caused by divisions by 1 α. − We will now introduce some notation which is needed for the following studies. First, we define the following vector valued function

˜ 2 ˜ ˜ R : [0, 1) [0, 1] Ê , [α,β] R−→(α,β), R−→(α,β) BC × → + 7→ R2 R1 h i which parametrizes the boundary of ˜ (α) for any time division parameter α [0, 1) by RBC ∈ the power distribution β [0, 1]. Obviously, we can express any rate pair R˜ BC(α,β) = 0 in its polar coordinates. Accordingly,∈ the angle is given by 6

R˜−→(α,β) arctan R1 , if β = 0 π R˜−→(α,β) ϕ˜BC : [0, 1) [0, 1] [0, 2 ], [α,β] R2 6 × → 7→  π if  2 , β = 0 and the radius can be calculated by  ˜ ˜ R : [0, 1) [0, 1] Ê , [α,β] R (α,β) BC × → + 7→ BC 1 2 2 with R˜ ˜−→ ˜−→ so that we can write BC(α,β) 1 = RR1(α,β) + RR2(α,β) q   R˜ BC (α,β)= R˜BC(α,β) cos ϕ˜BC(α,β) , sin ϕ˜BC(α,β) .    In the proofs for the results on the bidirectional achievable rate region we often use the polar representation of a rate pair. Additionally, we extensively use the monotony and concavity properties of the rate constraints, which we will prove in the next lemma.

Lemma 2.18. The rate functions R˜−→(α,β) and R˜−→(α,β) are concave for [α,β] [0, 1) R2 R1 ∈ × [0, 1] and strictly decreasing for α [0, 1). ∈ Proof. The proof can be found in Appendix 2.8.14.

46 2.2 Achievable Rate Region

The concavity of the rate constraints allows us to derive convexity of the rate region in the next proposition.

Proposition 2.19. For any α [0, 1) the set of rate pairs ˜ (α) is convex. ∈ RBC

Proof. The proof can be found in Appendix 2.8.15.

Proposition 2.20. For any arbitrary but fixed time division parameter α [0, 1) the function ∈ of the angle ϕ˜ (α,β) is continuously and strictly decreasing for β [0, 1]. It follows that BC ∈ there exists an inverse mapping β˜ : [0, 1) [0, π ] [0, 1] which is implicitly defined by BC × 2 →

ϕ˜BC(α, β˜BC(α,ϕ)) = ϕ.

Proof. For any non-degenerate fixed time factor it is obvious that the rates ˜−→ α RR1(α,β) and R˜−→(α,β) are continuous and strictly decreasing and strictly increasing for β [0, 1]. R2 ∈ R˜−→(α,β) Accordingly the ratio R1 is continuous and strictly decreasing. Since the trigonometric R˜−→(α,β) R2 function arctan is continuous and strictly increasing the angle ϕ˜BC(α,β) is continuous and strictly decreasing for β [0, 1]. Then it follows that for fixed α [0, 1) there exists an ∈ ∈ inverse mapping ϕ˜BC(α, β˜BC(α,ϕ)).

With this we can specify the radius R˜BC(α,β) with respect to the angle ϕ by a new defined function as follows

˜ π ˜ ˜ R : [0, 1) [0, ] Ê , [α,ϕ] R (α, β (α,ϕ)). (2.36) BC × 2 → + 7→ BC BC

Similarly, since ˜BC(α) is convex for any α [0, 1) we get an unique parametrization of R˜ ∈ π the boundary of BC(α) in the first quadrant with respect to the angle ϕ [0, 2 ] according to R ∈

˜ π 2 ˜ ˜ ˜ ˜ R : [0, 1) [0, ] Ê , [α,ϕ] R−→(α, β (α,ϕ)), R−→(α, β (α,ϕ)) . BC × 2 → + 7→ R2 BC R1 BC h i with the equality R˜ BC(α,ϕ)= R˜ BC(α, ϕ˜BC(α,ϕ)).

Bidirectional Achievable Rate Region

In this section we study the bidirectional achievable rate region using superposition encoding and scaled powers. As in the case of non-scaled powers we first prove an equivalent charac- terization of the achievable rate region which then allows us to prove its convexity. Besides we can show that the combinatoric of the MAC rate region transfers for the scaled powers as

47 2 Bidirectional Relay Communication using Superposition Encoding well. This shows the conceptual parallelism of both interpretations of the power constraints. However, the proofs here are more involved due to the non-linear dependence of the time division parameter. This is also the reason that no closed-form solution of the weighted rate sum maximum can be obtained. But with the equivalent characterization of the boundary, including its combinatoric, and the knowledge of the convexity this can be easily obtained algorithmically.

For a successful bidirectional transmission the rate pair [R1, R2] has to be achievable in the MAC and BC phase simultaneously. It follows that the bidirectional achievable rate region for a fixed time division parameter α [0, 1] is given by the intersection of the rate regions ∈ of the MAC and BC phase, i.e.

˜ (α) := ˜ (α) ˜ (α). (2.37) RBR CMAC ∩ RBC Since ˜ (α) and ˜ (α) are convex, it follows that the intersection ˜ (α) is convex CMAC RBC RBR as well. Notice, that for α = 0 or α = 1 we have ˜ (α)= . RBC ∅ The next natural extension is to look at the achievable rate region where we additionally allow to optimize the time division between the MAC and the BC phase. This rate region is obviously given by the union over all possible time division parameters α as follows

˜BRopt := ˜BR(α)= ˜BR(α)= ˜MAC(α) ˜BC(α) (2.38) R α∈[0,1]R α∈(0,1)R α∈(0,1)C ∩ R S S S where we used the fact that ˜BC(α)= for α = 0 or α = 1. As a union of convex sets the rate region ˜ need notR be convex.∅ Convexity can be achieved if we allow time-sharing RBRopt between bidirectional rate pairs with different time division parameters, but in Theorem 2.26 we show that ˜ is already convex. To this end we first prove in the next theorem an RBRopt equivalent representation of the achievable rate region ˜ . RBRopt

Theorem 2.21. The bidirectional achievable rate region with optimal time division ˜BRopt is given by R

˜ = ˜ ˜ ˜ (2.39) RBRopt R1 ∩ R2 ∩ RΣ with rate regions

˜ 2 π ˜ ˜ := R Ê : ϕ [0, ] such that R R (ϕ) cos(ϕ), R R (ϕ) sin(ϕ) , R1 ∈ + ∃ ∈ 2 1 ≤ 1 2 ≤ 1 ˜ 2 π ˜ ˜ := R Ê : ϕ [0, ] such that R R (ϕ) cos(ϕ), R R (ϕ) sin(ϕ) , R2  ∈ + ∃ ∈ 2 1 ≤ 2 2 ≤ 2 ˜ 2 π ˜ ˜ := R Ê : ϕ [0, ] such that R R (ϕ) cos(ϕ), R R (ϕ) sin(ϕ) , RΣ  ∈ + ∃ ∈ 2 1 ≤ Σ 2 ≤ Σ 

48 2.2 Achievable Rate Region

R˜−→(α) ˜ π ˜ 1R R1 : [0, 2 ] Ê+, ϕ max min RBC(α,ϕ), , (2.40a) → 7→ α∈[0,1] cos(ϕ)   R˜−→(α) ˜ π ˜ 2R R2 : [0, 2 ] Ê+, ϕ max min RBC(α,ϕ), , (2.40b) → 7→ α∈[0,1] sin(ϕ)   R˜MAC(α) ˜ π ˜ Σ RΣ : [0, 2 ] Ê+, ϕ max min RBC(α,ϕ), . (2.40c) → 7→ α∈[0,1] cos(ϕ)+sin(ϕ) n o Before we refer on the proof of the theorem we will state two simple but important observa- tions in the following remark and lemma.

Remark 2.22. The rate regions ˜ , ˜ , and ˜ are characterized by the boundaries in R1 R2 RΣ the first quadrant in polar coordinates. This means that R˜1(ϕ), R˜2(ϕ), R˜Σ(ϕ) specify the radius of the rate vectors on the boundaries of the rate regions for each ϕ [0, π ]. ∈ 2 Lemma 2.23. For any ϕ [0, π ] the maximizing time division parameter α for the radii ∈ 2 given by (2.40a), (2.40b), and (2.40c) are uniquely characterized by an α where the first and second arguments of the minima are equal. This allows us to define the optimal time division parameters for any ϕ [0, π ] as follows ∈ 2

R˜−→(α) α˜∗ : [0, π ] [0, 1], ϕ arg max min R˜ (α,ϕ), 1R , (2.41a) 1 2 → 7→ BC cos(ϕ) α∈[0,1]   R˜−→(α) α˜∗ : [0, π ] [0, 1], ϕ arg max min R˜ (α,ϕ), 2R , (2.41b) 2 2 → 7→ BC sin(ϕ) α∈[0,1]   R˜MAC(α) ∗ π ˜ Σ α˜Σ : [0, 2 ] [0, 1], ϕ arg max min RBC(α,ϕ), cos(ϕ)+sin(ϕ) . (2.41c) → 7→ α∈[0,1] n o

Proof. The proof of the Lemma 2.23 and the Theorem 2.21 can be found in Appendices 2.8.16 and 2.8.17 respectively.

In Figure 2.6 (a) we depicted the intersection of the achievable rate regions R˜1, R˜2, and R˜Σ of an example. We see that for this example the rate regions are convex and that the combinatoric of the MAC rate region transfers as well. In the following we will prove that this holds in general. In addition, in Figure 2.6 (b) we depicted the achievable rate regions and ˜ with the same power constraint values. However, we want to emphasize RBRopt RBRopt that it is hardly possible to draw consequences from the comparison since different power constraint models are assumed.

Theorem 2.24. In the first quadrant there is exactly one intersection between the bound- aries ˜ , ˜ , and ˜ . The rate pairs of the intersections are transformed vertices of a R1 R2 RΣ corresponding MAC rate region. Let ϕ˜12, ϕ˜Σ1, and ϕ˜2Σ denote the angles of the intersection

49 2 Bidirectional Relay Communication using Superposition Encoding

1.2 2 0.8 |h |2 =0.7 |h | =0.7 1 1 2 |h |2 =0.5 |h | =0.5 2 2 γ =1.3 γ =1.3 1 0.9 1 0.6 γ =1 γ =1 2 2 γ =1.7 γ =1.7 R [bit/channel use] R [bit/channel use]

2 0.6 2 0.4 rate R rate R 0.3 0.2

0 0 0 0.3 0.6 0.9 0 0.2 0.4 0.6 0.8 rate R [bit/channel use] rate R [bit/channel use] 1 1

(a) Equivalent characterization of R˜ BRopt as (b) Comparison between rate region with intersection of R˜ 1 (dashed line), R˜ 2 (dashed- scaled powers R˜ BRopt (solid line) and non- dotted line), and R˜ Σ (dotted line). scaled powers RBRopt (dashed line).

Figure 2.6: Achievable rate region ˜ (with scaled powers). RBRopt between the boundaries of ˜1 and ˜2, ˜Σ and ˜1, and ˜2 and ˜Σ respectively. Then we have R R R R R R R˜ (ϕ ˜ ) R˜ (ϕ ˜ ) = R˜ (ϕ ˜ ), Σ 12 ≤ 1 12 2 12 R˜ (ϕ ˜ ) R˜ (ϕ ˜ ) = R˜ (ϕ ˜ ), 2 Σ1 ≥ Σ Σ1 1 Σ1 R˜ (ϕ ˜ ) R˜ (ϕ ˜ ) = R˜ (ϕ ˜ ). 1 2Σ ≥ 2 2Σ Σ 2Σ Furthermore, we have

R˜1(0) < R˜Σ(0) < R˜2(0) (2.42a) ˜ π ˜ π ˜ π R1( 2 ) > RΣ( 2 ) > R2( 2 ) (2.42b)

Proof. The proof can be found in Appendix 2.8.18.

With the equivalent description of the rate region in Theorem 2.21 and the knowledge about the combinatoric we can finally characterize the boundary of ˜ . RBRopt ˜ π 2 Corollary 2.25. The section-wise defined rate pair function R : [0, ] Ê with opt 2 → + R˜ (ϕ), if ϕ [ϕ ˜ , 0] 1 ∈ Σ1 R˜ opt : ϕ [cos(ϕ), sin(ϕ)] R˜ (ϕ), if ϕ (ϕ ˜ , ϕ˜ ) 7→  Σ ∈ 2Σ Σ1 R˜ (ϕ), if ϕ [ π , ϕ˜ ] 2 ∈ 2 2Σ 

50 2.3 Throughput Optimal Resource Allocation

characterizes the boundary of the bidirectional achievable rate region ˜BRopt for the opti- mal time division and power scaling. R

Proof. The proof can be found in Appendix 2.8.19.

The next theorem proves that ˜ is convex, which is an important property to solve RBRopt optimization problems.

Theorem 2.26. The rate regions ˜1, ˜2, and ˜Σ are convex. It follows that ˜BRopt is convex as well. R R R R

Proof. The proof can be found in Appendix 2.8.20.

Since the rate constraints depend non-linearly on the time division parameter α closed-form solutions are in general not possible. This includes the weighted rate sum maximum problem as discussed in the previous sections. But since we know that ˜BRopt is convex, we know 2 R that for a given weight vector [q , q ] Ê the weighted rate sum maximum is on the 1 2 ∈ + boundary of ˜ . Then with the characterization of the boundary given in Corollary 2.25 RBRopt we can easily implement an iterative algorithm which finds the optimum. For that reason for the remaining sections of this chapter we will always consider the previous model without scaled power constraints. However, there is no difficulty in transferring the following results to the case of bidirectional relaying with optimal time division and power scaling.

2.3 Throughput Optimal Resource Allocation

In this section we are interested in a cross-layer design of the Data Link Layer and the Phys- ical Layer, which includes the Medium Access Sublayer. We are interested in an efficient power control and channel allocation strategy with respect to the higher layer traffic. Ac- cordingly, we are concerned with an adaptive resource allocation policy which takes the exogenous stochastic arrivals at nodes 1 and 2 from the higher layer into account. To this end we look at time slotted queueing processes with ergodic arrival processes where the information theoretic bidirectional achievable rates of the previous section serve as service rates9.

9In other sections of the thesis we consider achievable rates measured in bits per channel use, which describe the spectral efficiencies in [bits/s/Hz] for a given wireless system. In this section we consider service rates which are measured in [bits/s]. For notational and conceptual simplicity and without loss of generality we use the previous derived rates, which means that the system we consider has normalized band-limited channels with 1 Hz bandwidth.

51 2 Bidirectional Relay Communication using Superposition Encoding

ρ 1 1 R 2 ρ2 h1 h2 q1 q2 R 1 ,α R 1 ,R 2 ,β,α R 2 ,α

Controller

Figure 2.7: Service rate allocation by a centralized controller according to a rate allocation policy based on the current queue and channel state for bidirectional relaying with ergodic arrival processes and queues with infinite buffer size at nodes 1 and 2.

In Figure 2.7 we schematically depicted the considered queueing model. At random time instants packets arrive at nodes 1 and 2 for the other node, which are stored in queueing buffers with infinite buffer size until they are served. It is important to notice that the relay node has no internal queue, which means that we do not allow that any message will be stored at the relay node. Accordingly, any message received in the MAC phase has immediately to be forwarded in the BC phase.

We assume independent time-variant flat fading channels, where the channels stay constant for the duration of a time slot. Thereby, the duration of the time slot is long enough so that the assumption of a reliable transmission per time slot is reasonable. From time slot to time slot the channel coefficients change independently. The evolution of each channel coefficient is modeled by an ergodic and stationary random process.

At the beginning of each time slot the centralized controller adjusts the resource allocation and therefore the service rates with respect to the bidirectional rate region according to the rate allocation policy. Therefore, we assume that the centralized controller has access to the current queue and channel state. For the rate allocation the controller decides for the coding rates, which implies the power distribution factor β at the relay node and, if it is allowed, the time division parameter α. The maximum throughput policy for the bidirectional relaying protocol is an adaptation of the maximum differential backlog algorithm developed by Tas- siulas and Ephrimedes in the landmark paper [TE92]. Thereby, we do not need the dynamic routing capability of the differential backlog strategy since we have fixed routes.

As we saw in Section 2.2 the bidirectional achievable rate region depends on the time division between the two phases. For the following maximum throughput policy we need to know the weighted rate sum pair of the achievable rate region. Conceptually, it makes no difference if we consider the fixed or optimal time division. Therefore, let denotes the bidirectional RBR achievable rate region which stands for the bidirectional rate region (α) or RBR RBRopt respectively. From the following discussion of the maximum throughput policy we see the

52 2.3 Throughput Optimal Resource Allocation importance of the complete knowledge of the achievable rate region and the Pareto optimal rate pairs.

The design goal for a throughput optimal strategy in our queueing system is stability. The stability is proved by the well-developed theory of drift analysis using a quadratic Lyapunov function on the buffer levels [MT93, KM95, MLMN00, MMAW99, LMNM01]. It shows that the policy establishes stability for all arrival rate vectors within the maximal stability region, which is equal to the ergodic rate region. Our stability analysis is adapted from the cross-layer design for a satellite broadcast scenario from Neely, Modiano, and Rhors in [NMR03]. In [NMR05] they extend their policy to joint routing and power allocation for wireless networks, which means that their cross-layer design approach includes the routing problem of the Network Layer. These interesting techniques and results are also presented more a more comprehensive fashion in [Nee03] and in a more tutorial fashion in [GNT06].

The work [TG95] from Telatar and Gallager is one of first works which combines an informa- tion theoretic model with a queueing model. After that, several cross-layer design problems have been studied. In [BJH03, BW06, BW07] Boche et al. study channel aware scheduling for the MIMO multiple access channel and present an optimization-theoretic analysis of the cross-layer design as well as an iterative optimization method. Recently, in [YB05] the sta- bility analysis for the parallel Gaussian relay channel is presented. For more references of related works we refer to reference lists of the previous mentioned works.

2.3.1 Stability Region

For this cross-layer design approach we first introduce the assumptions of the considered queueing model. Then we present the ergodic achievable rate region, which is equal to the maximal stability region; and finally, we discuss a maximum throughput policy. We consider the scenario depicted in Figure 2.7, where at nodes 1 and 2 packets for the other node arrive at random time instants. The packets are stored in queueing buffers with infinite size until they are served. For simplicity we assume that we can continuously split the data. The service of transmission to the other node is provided by bidirectional relaying protocol. Without loss of generality, we consider a normalized system with band-limited channels with 1 Hz bandwidth. Accordingly, the possible service rates are given by the bidirectional achievable rate region with rates in [bits/s] and are chosen by a centralized controller according to the rate allocation policy. Thereby, we assume that the controller does not optimize the resource allocation over time.

For the rest of this section we assume a block-fading channel model, where the flat-fading channel gains are assumed to be constant during a time period T . This allows us to consider frames in a time slotted system model where the n-th slot denotes the time period [(n − 1)T,nT ]. We assume that the frame duration T is long enough that we can transmit a

53 2 Bidirectional Relay Communication using Superposition Encoding codeword with a sufficient block length, which means that assuming information theoretic rates as service rates is a reasonable simplification. We model the evolution of the channel from nodes 1 and 2 to the relay node by an independent stationary and ergodic process h[n] = h [n], h [n] with finite state space H = and steady-state distribution 1 2 H1 ×H2 πh = π π . Accordingly, let h[n] denote the bidirectional achievable rate region h1 h2  RBR for the channel state h[n]. The network controller adjusts the rates and therefore the resource  allocation at the beginning of each frame.

Further, we assume independent ergodic arrival processes A[n] = A1[n], A2[n]] at nodes 1 and 2 with bounded first and second moment. This includes homogeneous Poisson arrival   processes with negative exponential distributed inter-arrival times. Let λ = [λ1, λ2] denote

the average arrival rates at nodes 1 and 2. Then E A = λT specifies the mean number of { } packet arrivals per time slot. Furthermore, we assume independent random packet lengths Zi, i = 1, 2, with bounded first and second moments at each node. Thus, let Bi[n], i = 1, 2, denote the processes of number of bits arriving in time slot n at nodes 1 and 2. Then the bit arrival rate at node i is given by ρi = λi E Zi , i = 1, 2, in [bits/s]. Note that we have 2 { } E B < , i = 1, 2, due to the previous assumptions. { i } ∞ In general, the bits of the data packets cannot be sent immediately after their arrival. There- fore, at each node the arriving bits are stored in an internal queue with infinite buffer storage space until they are transmitted. The controller observes the queue lengths at the end of each time slot. Therefore, let Q[n] = Q1[n], Q2[n] represent the processes of number of remaining bits in the queues after the n-th time slot, which is obviously the same as in the   beginning of the n + 1-th time slot.. Finally, we assume a centralized controller which decides at the beginning of each time slot for the service rates R [n + 1], R [n + 1] (h[n + 1]) according to a rate allocation 1 2 ∈ RBR policy based on the current queue state Q[n] and channel state h[n + 1] of the new time slot.   Thereto, the controller adjusts the time division and relay power distribution parameters. Hence, the slot-to-slot dynamics of the queue lengths are given by the equation

Q [n] = max Q [n 1] R [n]T, 0 + B [n], i = 1, 2. (2.43) i { i − − i } i Since the arrival processes are memoryless and the service rates R[n] depend on the queue state Q(n 1) and the memoryless channel process h[n] only, the process Q[n] has Markov − property. Therefore, Q[n] describes a discrete-time Markov chain with state space Ê+. In the following we are interested in a maximum throughput policy. The throughput is de- fined as the mean number of bits transmitted from node 1 to 2 or vice versa in a unit of time. From queueing theory we know that for stability the utilization of a queueing system cannot be larger than one. This can be easily seen from the following. The utilization of a queueing system specifies the fraction of time in which a server is busy and is defined by the ratio of the mean bit arrival rate to the mean service rate. If the average number of bits that arrive

54 2.3 Throughput Optimal Resource Allocation is larger than the mean service rate, the queueing system is obviously unstable. Therefore, the maximum throughput is obviously upper bounded by the mean service rates. Since the information theoretic rates model the service rates, the upper bound is given by the ergodic bidirectional rate region, which we consider next.

Ergodic Bidirectional Rate Region

Let the overbar in R = [R , R ] and denote an ergodic rate pair and the ergodic 1 2 RBR bidirectional rate region respectively. Since BR(h) is convex for any channel state h H, the ergodic rate region is convex as well.R It follows that the ergodic rate region∈ can RBR be characterized by the ergodic rate pairs on its boundary. Due to linearity the ergodic 2 boundary rate pair for the normal vector q Ê 0 is given by the mean of rate pairs ∈ + \ { } which maximize the weighted rate sum with weight vector q, i.e.

⋆ R (q) = arg max q1R1 + q2R2 R∈RBR

= Eh arg max q1R1 + q2R2 {R∈RBR(h) }

= πh(h) arg max q1R1 + q2R2, H R∈RBR(h) hX∈ ⋆ ⋆ which can be calculated using Theorem 2.16. Let R1(q) and R2(q) denote the components of the rate pair R⋆(q). With this we get a characterization of the bidirectional ergodic rate region as follows

2 2 ⋆ ⋆ Ê = co R Ê : q 0 with R R (q), R R (q) . (2.44) RBR ∈ + ∃ ∈ + \ { } 1 ≤ 1 2 ≤ 2 n o Next, we study a resource allocation and scheduling policy for which queue stability is guar- anteed for all arrival rate vectors ρ =[ρ ,ρ ] within the ergodic rate region . 1 2 RBR

Maximum Throughput Policy

First we present a rate allocation policy derived from the maximum differential backlog algorithm presented in [TE93]. The policy achieves the maximum throughput which we will prove using the well-developed theory of drift analysis using a quadratic Lyapunov function as done in [MT93, KM95, LMNM01, NMR03], et al.

1 t

½ overflow Let fi(M) := lim sup t 0 [Qi(τ)>M]dτ, i = 1, 2, denote the functions as a mea- t→∞ sure of the fraction of timeR that the queue length Qi, i = 1, 2, is above a certain value M.

55 2 Bidirectional Relay Communication using Superposition Encoding

This allows us to define the meaning of system stability from the notion of weak stability for discrete-time Markov chains10 as follows.

Definition 2.27 ([NMR03]). For a given rate allocation policy a queueing system is stable if for all i = 1, 2 we have f (M) 0 as M . i → → ∞

With this, we can define the stability region of a policy as the set of bit arrival rate vectors ρ such that for any vector in the interior of the stability region system stability is achieved [TE93]. Accordingly, a policy dominates another policy if the stability region of the one contains the other. Further, the stability region of a system is the set of bit arrival rate vectors ρ such that for any vector in the interior at least one resource allocation policy exists which achieves system stability. Conversely, no stabilizing policy exists whenever ρ is outside. If ρ lies on the boundary, the system may or may not be stable. A policy that dominates any other policy is an optimal policy. Since the stability region of any policy is a subset of the maxi- mum throughput region, a policy whose stability region is equal to the maximum throughput region is optimal and is called a maximum throughput policy. The above definitions are adopted from [TE93]11. From the maximum differential backlog algorithm [TE93] we can deduce the following max- imum throughput policy which determines the rate and resource allocation and basically tries to equalize the queue length at nodes 1 and 2. It is noteworthy that the policy does not require any knowledge about the arrival rates or channel .

Maximum Throughput Policy 2.28. At the beginning of the n + 1-th time slot the cen- tralized network controller observes the current queue states [q1, q2] := Q[n] and the new channel states h := h[n + 1], and adjusts the relay power distribution and, if allowed, the time division parameter on the physical layer so that we achieve the rate pair which maximizes the weighted rate sum for the weight vector q in (h), RBR

R[n + 1] = arg max q1R1 + q2R2. [R1,R2]∈RBR(h)

This policy is a maximum throughput policy if the stability region of the proposed policy is equal to the ergodic bidirectional rate region. To show this we consider a positive quadratic Lyapunov function on the buffer levels and show that for any arrival rate vector within the er- godic rate region, the Lyapunov function has a negative drift whenever the mean queue length

10 Ê A Markov chain Q[n], n ∈ Æ , is weakly stable if for every ε > 0 there exists B ∈ such

that lim È{||Q[n]|| > B} < ε holds almost surely and strongly stable if it is weakly stable and n→∞

lim sup E{||Q[n]||} < ∞ holds almost surely. If the Markov chain is positive recurrent, then it is weakly n→∞ stable. 11Some authors call the maximum throughput policy a stability optimal policy to emphasis that this strategy stabilizes any arrival rate vector in the stability region of the system.

56 2.3 Throughput Optimal Resource Allocation is large. This allows us to deduce that the discrete-time Markov chain Q[n] is aperiodic, irreducible, and positive recurrent, which means that there exists a unique steady-state distri- bution (equilibrium) and the Markov chain is ergodic [MT93, KM95, LMNM01, NMR03]. Note that if the Markov chain Q[n] has a steady-state distribution it is positive recurrent and therefore stable.

2 2 Theorem 2.29 ([NMR03]). Let be given the Lyapunov function L(q) = i=1 qi . If there 2 exists a compact region Λ Ê and ǫ> 0 such that ⊆ P

2 Ê 1. E L Q[n + 1] Q[n]= q < , q , ∞ ∀ ∈ +

2. ELQ[n + 1] L Q[n] Q[n]= q < ǫ, q / Λ, − − ∀ ∈

3. whenever Q[n] = q Λ, there exists m Æ,m < , such that the probability ∈ ∈ ∞

È(Q[n + m]= 0) > 0, then there exists a steady-state distribution for the queue state Q and hence the system is stable.

The first two conditions ensure that the mean recurrence time to the Λ region is finite. The third condition ensures that the zero state is reached infinitely often with finite mean recur- rence times and therefore the Markov chain reduces to a single ergodic class. It is a necessary modification for queueing systems with uncountably infinite state space. But an even stronger drift can be achieved which proves the stability-in-the-mean of the queues and is called the strong stability of the Markov chain and implies weak stability. In [NMR03], a corresponding stronger drift condition is presented. Thereto, the authors generalize results from [LMNM01, KM96] to a Markov chain with uncountably infinite state space. The fundamental idea is that the drift gets larger in magnitude as the queue lengths increase, then the mean queue length is bounded.

Corollary 2.30 ([NMR03]). If condition three of the Theorem 2.29 holds and positive values υ and ζ exist such that

2

E L Q[n + 1] L Q[n] Q[n]= q <υ ζ q , − − i i=1    X

then there exists a steady-state distribution with bounded first moments E Qi < such 2 { } ∞ that ζ E Q <υ. i=1 { i} P Note that if the corollary holds then for any ǫ > 0, the negative drift condition of Theorem 2 2.29 is satisfied whenever we have i=1 qi > (υ + ǫ)/ζ, i.e. the sum of the queue lengths 2 is sufficiently large. This means that we would have the compact region Λ = q Ê : P { ∈ + 2 q υ+ǫ . i=1 i ≤ ζ } P

57 2 Bidirectional Relay Communication using Superposition Encoding

The policy here proposed is equivalent to the dynamic power allocation policy in [NMR03]. It is therefore possible to adapt the proof in [NMR03] with the following constant

2 2 2 2 2 υ := T max R1 + R2 + E Bi . h∈H,R∈R (h) { } BR i=1  X Since the arrival rate vector ρ is assumed to be strictly in the interior of the ergodic rate region, there exists a ζ˜ > 0 so that ζ˜[11] + ρ int also holds. Then the proof works ∈ RBR analog with ζ = 2T ζ˜. In Appendix 2.8.21 we reproduce the proof for completeness. The assumption of finite channel states and the power constraints ensure that the second mo- ment of the service rates is bounded. The following remark extracts the necessary condition which is necessary for the previous proof.

Remark 2.31. The finite channel state condition is used to bound in (2.107) the term 2 2 E R [n] Q[n]= q . We can weaken this condition if υ˜ < exists so that k=1 k | ∞  P 2 2 E max Rk υ.˜ R∈RBR(h) ≤ n Xk=1 o 2

2 2 2 2 E Then the proof works with υ :=υT ˜ + E Bi since k=1 Rk[n] Q[n] = q i=1 { } | ≤

2 2 2 Ê E max k=1 Rk for any q +.P  P R∈RBR(h) ∈  P 12 Finally, let E Di denote the average bit delay at node i. With Little’s Theorem we have

{ } 2 2

E E E E Q = ρ D . Therefore, we have υ/ζ > Q = D ρ using the { i} i { i} i=1 { i} i=1 { i} i boundedness of the first moment according to Corollary 2.30. This means that the bound P P grows asymptotically like 1/ζ as the arrival rate vector ρ is pushed towards the boundary of the ergodic rate region. A similar discussion is given in [NMR03].

2.3.2 Numerical Simulation

To clarify the previous results, we illustrate and discuss numerical simulation results of a simple example in this section. For the simulations we assumed independent homogeneous Poisson arrival processes. In order to indicate the performance gain, we present a comparison between the proposed bidirectional relaying using the optimal relay power distribution (OpR) with optimal time division (OpT) and equal time division (EqT), as well as Round-Robin

12Little’s Theorem states that for a queueing system with almost sure finite inter-renewal interval the expected number of customers in a queueing system is equal to the expected time each customer waits in the system times the rate of arrival [Gal96, Sect. 3.6].

58 2.3 Throughput Optimal Resource Allocation

2 2 |h | ~ U({0.3,0.6,0.9,1.2}) |h | =0.9 1 2 1 2 |h | ~ U({0.3,0.6,0.9,1.2}) |h | =0.3 2 2 γ =1 0.4 γ =1 1 1 γ =1.3 γ =1.3 2 2 0.4 γ =1.7

γ =1.7 [bit/s] R

R 2 [bit/s] 2

0.2

rate R 0.2 ergodic rate R

0 0 0 0.2 0.4 0 0.2 0.4 rate R [bit/s] ergodic rate R [bit/s] 1 1 (a) Achievable Rate Regions (b) Ergodic Rate Regions

Figure 2.8: The solid, dashed, dotted, and dashed-dotted line denote OpR OpT, OpR EqT, RR OpT, and RR EqT respectively with optimal/equal time division OpT/EqT and bidirectional relaying with the optimal relay power distribution OpR and round-robin RR for a normalized system with 1Hz bandwidth.

(RR) scheduling with optimal and equal time division (OpT/EqT). For the Round-Robin strategy we only change the scheduling strategy so that for any communication between two nodes the time slot is subdivided into two exclusive time intervals. Thereby, we still do not allow any node to cooperate across the time intervals. For each protocol we apply the throughput optimal resource allocation policy.

In Figure 2.8 (a) the achievable rate regions for a certain channel state are depicted. The dotted line depicts 0.5 and 0.5 so that its intersection denotes the correspond- RMAC RBC ing achievable rate region with equal time division (0.5). Furthermore, we present the RBIR achievable rate regions for the corresponding round robin strategies. On the boundary of BRopt some orthogonal vectors which characterize the optimal rate pair for a weight vector Rwith the same angle are depicted, cf. Theorem 2.16. We see that several orthonormal vectors with different angles belong to a rate pair of an intersection point, while a rate pair between the intersection points corresponds to exactly one orthonormal vector. Similar arguments apply for the other rate regions. For the round robin strategies it is optimal to select the in- tersection points for any non-negative weight vector. In particular for the equal time division case the upper right vertex is always optimal, which means that the bidirectional relaying separates in two independent unidirectional relaying protocols.

Figure 2.8 (b) depicts the corresponding ergodic rate region assuming identically uniformly distributed channel processes. Since it is hardly possible to observe, we want to note that the

59 2 Bidirectional Relay Communication using Superposition Encoding

0,6

OpR OpT bit] OpR OpT 6 0,4 OpR EqT OpR EqT 3 10 RR OpT 0,2 (n) [10 1

RR EqT Q 0 2 4 6 8 10 time slot n 4 2 x 10 10 0,6 RR OpT bit] 6 0,4 RR EqT

1 0,2 10 (n) [10 2 empirical mean queue backlog [bit] Q 0 0.1 0.2 0.3 0.4 0.5 2 4 6 8 10 abs. of bit arrival rate vector | ρ| in 1/s time slot n 4 x 10 (a) Average queue length evolution (b) Temporal queue length evolution

Figure 2.9: Comparison of the queue length evolutions of different resource allocation poli- cies where OpT and EqT specify the optimal and equal time division case and OpR and RR denote a bidirectional relaying with an optimal relay power distri- bution and a round-robin strategy respectively. ergodic rate region of the RR-OpT strategy is slightly bulged. For the throughput optimal resource allocation policy the stability region is given by the ergodic rate region. For that reason we also plotted the arrival rate vectors ρ of the simulated queue results in this figure. We simulated arrival rates along the dotted radial line with an angle ∠ = 1.0081.

Figure 2.9 (a) shows the average queue length evolutions along the radial line after 106 time slots with T = 1s. The vertical dotted lines denote the crossing of the stability region boundaries, which correspond to the bullets on the radial line in Figure 2.8 (b). It can be clearly seen that the average queue length strongly grows if ρ approaches the boundary of the stability region.

In Figure 2.9 (b) we present the temporal queue length evolutions for the different protocols with an arrival rate ρ = [0.16, 0.35] bit/s, which is marked in Figure 3 (b) by the cross ( ). × Since the vertical axes are scaled in 106 bits, the random fluctuation of the queue lengths are indistinguishable. As expected, it shows that the Round-Robin strategies cannot support the bit-load. Thereby it is interesting to observe that for the equal time division case (RR- EqT) the queue at node 1 remains stable while queue at node 2 overflows. The separated queue evolutions can be explained with the separation of the bidirectional protocol in two independent unidirectional protocols. At any time slot the rate allocation policy selects for any channel and queue state the upper right vertex of the rectangular, as mentioned for Figure 2.8 (a). This results in the ergodic rate pair [0.178, 0.205] bit/s, which is the upper right vertex

60 2.4 Relay Selection of the corresponding ergodic rate region in Figure 2.8 (b) so that that queue evolution at node 1 will be stable and queue at node 2 will be unstable.

2.4 Relay Selection

In this section we consider the problem of relay selection in a network where N relay nodes are willing to assist the bidirectional relay communication between the nodes 1 and 2. Ac- cordingly, we look for the “best route” which is a problem of the Network Layer. Since we propose to select a relay node based on the achievable rate region, which includes the optimal resource allocation and channel state information, this is again a cross-layer design approach.

The problem of relay selection is closely related to the question if the support of a relay node is beneficial. Already in [LTW04] Laneman, Tse, and Wornell propose a selective user strategy where the cooperative user decides based on the channel state if it either supports the other user or retransmits its own data. In [OS04, OSB06] we derive a sufficient condi- tion based on the pairwise error probability when it is advantageous to cooperate using an amplify-and-forward strategy in a linear relay network. Dawy and Kamoun show in [DK04] that the power consumption in multi-hop communication depends on the route selection and derive a relay region where using the relay is better than the direct transmission. Generally, we first have to decide if the support of a certain relay node is beneficial, which obviously depends on the performance metric, the applied protocol, and the available information to the controller. Then the controller decides for the “best relay node”.

In a network with N relays and independent time-variant fading channels there is the po- tential for a high spatial diversity order. To exploit this Laneman and Wornell extend in [LW03] the cooperation idea to larger networks where they introduced the distributed space- time coding concept so that all relay nodes can participate for cooperation. They show that distributed space-time coding achieves full spatial diversity in terms of the outage probabil- ity. Other works follow this concept on distributed space-time coding or beamforming, e.g. [NBK04, SO04a, LBC+05, DSG+03]. Thereby it is important to notice that the performance improvement of multiple relay node diversity protocols is often boosted by an increasing sum power, which means that each participating relay node adds it transmit power to the commu- nication. Unfortunately, this often obscures the solely gain of the proposed diversity concept. In [LBC+05] the authors compare different decode-and-forward schemes where one or mul- tiple relay nodes are employed. They point out that the “effective coding gain” needs to be considered and propose a distributed power allocation between the relay nodes. The same conclusion is drawn in [ZAL06] for amplify-and-forward relay networks where the optimal distributed power allocation is obtained by an extended water-filling solution. Furthermore,

61 2 Bidirectional Relay Communication using Superposition Encoding they show that a selection scheme where only one relay node is chosen achieves full diversity order. There are obvious analogies to classical receiver combining techniques as equal gain, max- imum ratio, and selection combining [HM05]. Distributed beamforming and space-time coding concepts are comparable to equal and maximum ratio combining concepts with an equal and optimal power distribution among the relay nodes. Those strategies rely on coher- ent addition at the receiver so that the relay nodes need to be phase synchronized. Therefore, they are very sensitive to the channel state information which results for a practical system in a non-negligible technical challenge. This problem is not so serious for relay selection strategies. Relay selection is comparable to the selection combining concept. Moreover, if all nodes participate and we do not optimize the power allocation, relay selection strategies are more power efficient. Recently, some advanced studies on relay selection for unidirectional cooperative protocols are done. They study the relay selection problem with respect to the complexity, channel state information, and energy consumption. Furthermore, distributed solutions are proposed. In more detail, Lin, Erkip, and Stefanov consider in [LES06] coded user cooperation with the pairwise error probability as performance metric. They introduce the concept of a user cooperation decision parameter based on the user cooperation gain, which is used to define user cooperative regions. Hunter and Nosratinia propose in [HN04] various distributed part- ner allocation protocols where a certain number of cooperating users is selected according to a random strategy, a strategy based on the receive SNR, and a strategy with a fixed priority list of nodes in its neighborhood. Relay selection with respect to the energy consumption, where the cost of acquiring the CSI is factored in, is considered in [MMMZ06]. Moreover, in [BKRL06] opportunistic relay selection is presented, which is a distributed method based on channel measurements at the relay nodes. However, to the best of our knowledge, relay selection for bidirectional relaying has not been considered yet. In this thesis we assume a centralized decision for a relay node based on the achievable rate regions of all relay nodes. Since bidirectional communication is char- acterized by two rates, the decision for a “best relay node” is a vector optimization problem. Therefore, it is possible that we have several Pareto optima which may correspond to differ- ent relay nodes. We will see in the next section that we can further improve the performance if we allow time-sharing between the usage of different relay nodes. The decision for one Pareto optimum and its corresponding relay node may depend on other design aspects like the throughput optimal resource allocation policy of the previous section. If we consider time-variant block-fading channels with sufficient block-length so that we can apply relay selection based on the achievable rate region for each channel state, the average achievable rate region grows with the number of relay nodes N. For that goal we con- sider independent stationary and ergodic block-fading channel processes so that the average achievable rates are given by the ergodic rate region. Thereby, we do not optimize the power

62 2.4 Relay Selection allocation over the fading states. In Section 2.4.2 we show that in the iid Rayleigh fading case the growth of both maximal unidirectional achievable rates for bidirectional relaying ln(ln(N)) with relay selection and equal time division is asymptotically equal to 2 ln(2) . We will see that the scaling law can be used to asymptotically upper and lower bound the sum of any rate pair on the ergodic achievable rate regions for the equal and optimal time division case since we can upper and lower bound the sum-rate using the maximal unidirectional ergodic rates of the equal time division case.

2.4.1 Relay Selection Criterion

Here, we improve the performance by choosing the “best relay node” in a network where N relay nodes with possibly different relay power constraints offer support for the bidirectional relay communication between the nodes 1 and 2. We will see that the “best relay node” need not be optimal for all boundary rate pairs. Accordingly, the relay selection criterion has to be subtle enough to identify the optimal relay node for each boundary rate pair. For this purpose we generically extend for the n-th relay node the notation of the already introduced variables by an additional subscript index, e.g. h1,n denotes the channel between node 1 and the n-th relay node, etc. We first argue the reasoning of the relay selection criterion by means of the equal time di- vision case. After that we briefly discuss the corresponding formulas for the optimal time division case, where exactly the same arguments apply. It shows that these concepts can be easily generalized or applied to relay selection problems in other networks.

Equal Time Division

With the first proposition we want to raise awareness of a relay selection criterion based on the two-dimensional rate pair R =[R1, R2].

Proposition 2.32. We consider a network with two relay nodes, N = 2, and signal-to-noise ratios γ = γ and γ = γ . Iff we have h h and h h , then 1 2 R,1 R,2 | 1,1|≤| 1,2| | 2,1|≤| 2,2| with equality iff we have h = h and h = h . RBReq,1 ⊆ RBReq,2 | 1,1| | 1,2| | 2,1| | 2,2|

Proof. Since R−→ R−→ , R−→ R−→ , R R , R−→ (β ) R−→ (β ), 1R,1 ≤ 1R,2 2R,1 ≤ 2R,2 Σ,1 ≤ Σ,2 R2,1 1 ≤ R2,2 1 and R−→ (β ) R−→ (β ) for any β ,β [0, 1] it follows that and R1,1 2 ≤ R2,2 2 1 2 ∈ CMAC,1 ⊆ CMAC,2 and therefore . Equality follows immediately. RBC,1 ⊆ RBC,2 RBReq,1 ⊆ RBReq,2

From the proposition we see that we have a “good channel state” if the corresponding rate region contains the other; but if one channel gain is larger and the other one is smaller, none

63 2 Bidirectional Relay Communication using Superposition Encoding of both regions contains the other. Some rate pairs can be achieved with certain channel states respectively relay nodes only. This implies that there need not be one relay node which is the best for the whole two-dimensional achievable rate region. We conclude that for a reasonable relay selection criterion we need to look at each achievable rate pair individually.

First it is easy to see that in a network of N relay nodes with arbitrary channels and indi- vidual transmit power constraints we can achieve the union of all individual achievable rate regions, N RSeq := BReq,n (2.45) R n=1R S by selecting the corresponding relay node that achieves a certain rate pair. Since the union of convex regions need not be convex, the rate region using relay selection RSeq need not be convex. This is obtained if we additionally allow time-sharing between theR usage of the relay nodes. This means that one has to switch between two relay nodes. The time-sharing method is exactly described by the convex hull operator so that the rate region using relay selection with time-sharing is given by

:= co . (2.46) RRSTSeq RRSeq  Since a convex set can be characterized by the convex hull of the rate pairs which maximize the weighted rate sum, the set can be expressed as RRSTSeq

T 2

Ê 0 0 RSTSeq = co arg max Rq : q + . R R∈RRSeq ∈ \ { } ∪ n o   ∗ Let Req,n(q) denote the rate pair of the n-th relay node which maximizes the weighted rate sum for the weight vector q according to Theorem 2.10. Obviously, for any weight vector 2 q Ê 0 we have ∈ + \ { } T ∗ T max Rq = max Req,n(q)q . R∈RRSeq n∈{1,2,...,N}

From the previous considerations we can conclude on the following relay selection criterion for bidirectional relaying with equal time division.

2

Ê 0 Relay Selection Criterion 2.33. For any weight vector q + we have to select ∗ ∈ \ { } the relay node whose boundary rate pair Req,n(q) maximizes the weighted rate sum, which means that we have to do relay selection for each boundary rate pair individually. If there are multiple relay nodes which all achieve the weighted rate sum maximum, we have to apply time-sharing between the usage of the relay nodes with the corresponding rate pairs to achieve all rate pairs on the boundary of . RRSTSeq

64 2.4 Relay Selection

Accordingly, let

∗ T ∗ T eq(q) := n 1, 2,...,N : Req,n(q)q = max Req,n(q)q (2.47) N ∈ { } n∈{1,2,...,N} n o 2 denote the set of optimal relay nodes for a weight vector q Ê 0 with respect to the ∈ + \ { } achievable rate region . If (q) is a singleton, then there is only one optimal relay RRSTSeq Neq node. Otherwise we have to apply time-sharing between the usage of the relay nodes with the corresponding rate pairs to achieve all rate pairs on the boundary of . Accordingly, RRSTSeq the set ∗ (q) := co R∗ (q) : n (q) (2.48) RRSTSeq { eq,n ∈Neq } denotes the set of all optimal rate pairs for the weight vector q. Note that if (q) is not a Neq singleton, than time-sharing between two relay nodes will be sufficient. This is because the elements of are two-dimensional rate pairs so that time-sharing between the relay RRSTSeq node which has the largest R1 and the relay node which has the largest R2 can achieve any rate pair in . RRSTSeq

For weight vectors q which characterize the sum-rate maximum (q1 = q2), the maximal unidirectional rate R1 (q1 > 0 and q2 = 0), and the maximal unidirectional rate R2 (q1 = 0 and q2 > 0) it could be possible that multiple rate pairs on the boundary of BReq,n with ∗ ∗ R ∗ n eq(q) achieve the weighted rate sum maximum, cf. Σeq,n, 1eq,n, and 2eq,n. If ∈ N ∗ R ∗R ∗ R ∗ this is the case we have take for Req,n(q) in (2.48) any rate pair in Σeq,n, 1eq,n, or 2eq,n respectively. R R R

Figure 2.10 (a) illustrates the rate region using relay selection in a network with N = 3 relay nodes and equal time division. Note that some rate pairs can be achieved by time-sharing between two rate pairs of different relay nodes only. This means that one has to switch between two relay nodes.

Optimal Time Division

For the optimal time division case the same arguments apply as for the equal time division case. Some rate pairs can be achieved by certain relay nodes only. Therefore, the achiev- able rate region using relay selection is given by the union of all individual bidirectional achievable rate regions N RSopt := BRopt,n. R n=1R S

65 2 Bidirectional Relay Communication using Superposition Encoding

0.6 0.6 γ =0.7 1 γ =1 γ =1 1 2 γ =0.7 γ =1.3 2 0.4 R 0.4 [bit/channel use] [bit/channel use] 2 2

2 2 |h |2, |h |2, γ rate R |h | , |h | rate R 0.2 1 2 0.2 1 2 R 0.6, 1 1.1, 0.6, 1.3 0.8, 0.8 0.5, 1.4, 1.5 1, 0.6 0.8, 0.9, 0.8 0 0 0 0.2 0.4 0.6 0 0.2 0.4 0.6 rate R [bit/channel use] rate R [bit/channel use] 1 1 (a) Achievable rate regions for equal time di- (b) Achievable rate regions for optimal time di- vision: RRSTSeq (solid line) and RBReq,n for vision: RRSTSopt (solid line) and RBRopt,n for n = 1, 2, 3 (dashed line). n = 1, 2, 3 (dashed line).

Figure 2.10: Achievable rate regions of relay selection with time-sharing for N = 3 relay nodes. Note that some rate pairs can be only achieved by time-sharing between two rate pairs of different relay nodes.

If we additionally allow time-sharing between the usage of the relay nodes, then the achiev- able rate region is convex and can be expressed as

:=co (2.49) RRSTSopt RRSopt T 2

Ê 0 0 =co arg max Rq : q + . R∈RRSopt ∈ \ { } ∪ n o   ∗ Let Ropt,n(q) denote the rate pair of the n-th relay node which maximizes the weighted rate sum for the weight vector q = [q1, q2] according to Theorem 2.16. Then for any weight 2 vector q Ê 0 we have ∈ + \ { } T ∗ T max Rq = max Ropt,n(q)q . R∈RRSopt n∈{1,2,...,N}

Again, we propose to do relay selection for each boundary rate pair individually.

2

Ê 0 Relay Selection Criterion 2.34. For any weight vector q + we have to select ∗ ∈ \ { } the relay node whose boundary rate pair Ropt,n(q) maximizes the weighted rate sum. If there are multiple relay nodes which all achieve the weighted rate sum maximum, we have to apply time-sharing between the usage of the relay nodes with the corresponding rate pairs to achieve all rate pairs on the boundary of . RRSTSopt

66 2.4 Relay Selection

2 Similarly, we can define for any weight vector q Ê 0 the set ∈ + \ { } ∗ T ∗ T opt(q) := n 1, 2,...,N : Ropt,n(q)q = max Ropt,n(q)q , (2.50) N ∈ { } n∈{1,2,...,N} n o which characterizes the optimal relay nodes with respect to the achievable rate region RSTSopt. As before, there is only one optimal relay node if opt(q) is a singleton. Oth- erwiseR we have to apply time-sharing between the usage of theN relay nodes with the corre- sponding rate pairs to achieve all rate pairs on the boundary of RSTSopt. Accordingly, the set R ∗ (q) := co R∗ (q) : n (q) RRSTSopt { opt,n ∈Nopt } denotes the set of all optimal rate pairs for the weight vector q. Since the elements of are two-dimensional, there exist two relay nodes so that time-sharing between RRSTSopt those two relay nodes will be sufficient to achieve any rate pair in ∗ (q). RRSTSopt Figure 2.10 (b) illustrates the rate region using relay selection with time-sharing for a sce- nario with N = 3 relay nodes and optimal time division. Thereby note that some rate pairs can be achieved by time-sharing between two rate pairs of different relay nodes only. In the next section, we study the scaling of the diversity gain in a time-variant fading con- text.

2.4.2 Scaling Law of the Ergodic Rate Region

We now consider a network with N relay nodes in the presence of time-variant fading. Therefore, we assume independent stationary and ergodic block-fading channel processes h [m] , k = 1, 2, n = 1, 2,...,N. The channel remains constant over blocks con- { k,n }m sisting of M symbol periods and changes independently from block to block. Thereby, we assume a block length M so that the error-free coding assumption is reasonable. We do not optimize the power allocation over time-varying channel states, which we regard as future work. Accordingly, we are interested in the time average of the achievable rates obtained at each fading instant, which is given by the ergodic achievable rate region. We first study the ergodic rate region for the equal time division case. After that we will extend the results for the ergodic rate region with the optimal time division between the phases.

Equal Time Division

Let (h) denote the achievable rate region using relay selection with time-sharing for RRSTSeq the channel state h according to (2.46). Then let ∗ (q, h) denote the set of optimal RRSTSeq achievable rates for a weight vector q and channel state h. We characterize the ergodic rate

67 2 Bidirectional Relay Communication using Superposition Encoding region by its boundary. To this end, we choose for any weight vector q and channel RRSTSeq state h a rate pair in ∗ (q, h). However, if ∗ (q, h) is not a singleton we have RRSTSeq RRSTSeq to consider any possible rate allocation for this weight vector and channel state. We sum this up with a definition of a rate allocation policy. For a weight vector q let Ξeq(q) denote a rate allocation policy R(h) h that decides for any channel realization h for a rate pair R(h) ∗ (q, h). Then ∈ RRSTSeq 

∗ 2 E (q) := R Ê : there exists a policy Ξ (q) with R = R(h) RRSTSeq ∈ + eq n  o 2

Ê 0 denotes the set of ergodic rates we can achieve for a weight vector q + . Therewith we can express the ergodic rate region as follows ∈ \ { }

2 2 Ê := co [R , R ] Ê : there exists q 0 with RRSTSeq 1 2 ∈ + ∈ + \ { } n R R , R R , [R , R ] ∗ (q) . 1 ≤ 1 2 ≤ 2 1 2 ∈ RRSTSeq o

∗ In the following let RRSTSeq(q) RSTSeq denote a rate pair on the boundary that achieves ∈ R 2 the weighted rate sum maximum with weight vector q Ê 0 , this means we have ∈ + \ { } R∗ (q)qT = max RqT . Due to the time-sharing operation (convex hull) RSTSeq R∈RRSTSeq the rate pair need not be unique.

We now study how the ergodic rate region using relay selection increases with an increasing number of relay nodes. To this end we look at the maximal unidirectional ergodic rates, which allows us to upper and lower bound the sum of any ergodic rate pair on the boundary of . Then for iid Rayleigh fading channels we can conclude from a scaling law for RRSTSeq the maximal unidirectional ergodic rates how the rates of rate pairs on the boundary of the ergodic rate region increase with increasing number of relay nodes.

According to (2.22a) and (2.22b) let R∗ := 1/2 min R−→ , R−→ (1) and R∗ := 1eq,n { 1R,n R2,n } 2eq,n 1/2 min R−→ , R−→ (1) denote the maximal unidirectional rate of the n-th relay node. { 2R,n R1,n } Therewith, we get the maximal unidirectional rates using relay selection as follows

∗ ∗ RkRSeq := max Rkeq,n, k = 1, 2. n∈{1,2,...,N}

We first state a technical lemma where we do some algebra for random variables. After that, we will use the lemma to characterize the statistics of the maximal unidirectional rates using relay selection. The lemma is stated for arbitrary real channel distributions but most of the succeeding results are obtained for the Rayleigh distributed fading channels.

68 2.4 Relay Selection

Lemma 2.35. Let Xn and Yn, n = 1, 2,...,N, be pairwise independent non-negative real random variables with probability density functions (pdf) fXn (xn) and fYn (yn). Further, let FXn (xn) and FYn (yn) denote the corresponding cumulative distribution functions (cdf). Then the random variable Zn := min anXn, bnYn with positive weights an and bn has the pdf { } 1 zn zn 1 zn zn fZ (zn)= fx ( )(1 Fy ( )) + fy ( )(1 Fx ( )) n an n an − n bn bn n bn − n an and the cdf zn zn FZ (zn) = 1 (1 Fx ( ))(1 Fy ( )). n − − n an − n bn The maximum Z := max Z , Z ,...,Z has the pdf { 1 2 N } N N

fZ (z)= fZn (z) FZj (z). n=1 j=1,j6=n P Q And finally, f (R) = 2 ln(2)22Rf (22R 1) R Z − 1 specifies the pdf of the random variable R = 2 log[1 + Z] as a function of the random variable Z.

Proof. The proof can be found in Appendix 2.8.22.

Remark 2.36. It is interesting to observe that Z = min aX,bY in the case of exponential −x/σ2 −y/σ{ 2 } distributions Fx(x) = 1 e x and Fy(y) = 1 e y is again exponential distributed −z/λ − 1 1 − with Fz(z) = 1 e and λ = 2 + 2 . − aσx bσy

Before deriving the asymptote of the growth of the sum of the ergodic rates on the boundary of the ergodic rate region using relay selection, we first look at the probability that the relay selection can be drawn by Proposition 2.32. In other words, we are interested in the proba- bility that there exists a relay node η whose rate region contains the regions of all RBReq,η others, i.e. È( η : = ). Such a relay node exists iff we have (q)= η ∃ RRSeq RBReq,η Neq { } for all q. The intuition says that with an increasing number of relay nodes it will be less probable.

Proposition 2.37. For bidirectional relaying with relay selection and equal time division let f ( h ) and F ( h ) denote the pdf and cdf of the absolute value of the channel |hk,n| | k,n| |hk,n| | k,n| h defined on the support set . In a network with independent channels where each k,n S|hk,n| relay node has the same power constraint γR, the probability that there exists a relay node

69 2 Bidirectional Relay Communication using Superposition Encoding

η 1, 2,...,N whose rate region contains the rate regions of all others is given by ∈ { }

N N È È( η : = )= ∃ RRSeq RBR,η RBReq,η ⊇ RBReq,n η=1 n=1 X [  N 2 N = F ( h )f ( h ) d h . |hk,n| | k,η| |hk,η| | k,η| | k,η| η=1 S|h | X kY=1 Z k,n n=1Y,n6=η In the case of iid Rayleigh fading h (0,σ2) we have k,n ∼ CN k 1

È( η : = )= . ∃ RRSeq RBReq,η N

Proof. The proof can be found in Appendix 2.8.23.

In the case of iid Rayleigh fading the intuition is proved. We see that with an increasing number of relay nodes the Proposition 2.32 is more often not applicable. In the next theo- rem we characterize the distributions of the maximal unidirectional rates in a network with independent Rayleigh distributed fading channels.

Theorem 2.38. For bidirectional relaying with relay selection and equal time division, we assume independently distributed channel coefficients h (0,σ2 ) for all k = 1, 2 k,n ∼ CN k,n and n = 1, 2,...,N. Then the probability density function of the maximal unidirectional ∗ rate using relay selection RkRSeq, k = 1, 2, is given by

N ∗ ∗ ∗ 2RkRSeq 2RkRSeq f(RkRSeq) = 2 ln(2) λk,n exp (1 2 )λk,n 2 n=1 − P N  2R∗ 1 exp (1 2 kRSeq )λk,m m=1,m6=n − − Q   1 1 1 1 with λ1,n = 2 + 2 and λ2,n = 2 + 2 . γ1σ1,n γRσ2,n γ2σ2,n γRσ1,n

Proof. The proof can be found in Appendix 2.8.24.

The theorem allows us to calculate the ergodic maximal unidirectional rates.

70 2.4 Relay Selection

∗ ∗ Corollary 2.39. The ergodic maximal unidirectional rate RkRSeq = E RkRSeq , k = 1, 2, for bidirectional relaying with relay selection and equal time division in the case of indepen-  dent Rayleigh distributed fading is given by

N ∗ λk,n exp(λk,n)E1(λk,n) RkRSeq = 2 ln(2) λk,n n=1 h X (2.51) N−1 exp(λk,n + λk,l)E1(λk,n + λk,l) + ( 1)m l∈L l∈L − Pλ + λ P m=1 k,n k,l X L⊆JXn,|L|=m l∈L i P ∞ e−t with the exponential integral E1(x) = x t dt. In the last sum we have to sum over all subsets of the index set = 1, 2,...,N n with cardinality = m. If we have L Jn { R } \ { } |L| λk,n = λk for all n = 1, 2,...N, then (2.51) results in

N−1 N 1 exp((n + 1)λ )E ((n + 1)λ ) R∗ = N − k 1 k . (2.52) kRSeq n ( 1)n(n + 1)2 ln(2) n=0 X   − Proof. The proof can be found in Appendix 2.8.25.

In Figure 2.11 (a) we illustrate the enlargement of the ergodic rate region due to relay selec- tion for the equal time division case. Thereby, we assume equal relay transmit powers and iid Rayleigh fading. We see that the gain decreases with increasing number of relays. In the following we are interested in the scaling law of this growth. For its derivation, we need the analytical expression for the maximal unidirectional ergodic rate of the previous corollary.

Since RSTSeq is convex, we can upper and lower bound the sum-rate of any boundary rate R∗ pair RRSTSeq(q) of the ergodic rate region as follows

2 ∗ ∗ R∗ q ∗ min R1RSeq, R2RSeq RSTSeq( ) 1 RkRSeq. (2.53) { } ≤ ≤ k=1

P The first inequality holds because RSTSeq is convex and the sum of any rate pair from the R ∗ ∗ time-sharing between the rate pairs [R1RSeq, 0] and [0, R2RSeq] already fulfills the condition. ∗ ∗ The second inequality follows from the fact that R1RSeq and R2RSeq are both the maximal unidirectional ergodic rates so that the sum of any rate pair on the boundary of RSTSeq has to be smaller. R We now derive a scaling law for the growth of the sum-rate of any rate pair on the boundary of the ergodic rate region RSTSeq with increasing number of relay nodes in an iid Rayleigh fading scenario. To this end,R we present in the next theorem an upper and lower bound on ∗ the maximal unidirectional ergodic rate RkRSeq, k = 1, 2, which are asymptotically tight.

71 2 Bidirectional Relay Communication using Superposition Encoding

γ =0.5 1 γ =0.5 1 1 γ =1.5 γ =1.5 0.8 2 2 γ =1.3 γ =1.3 0.7 R 0.8 R 0.6

2 2 0.6 0.5 0.4 0.4 0.3

ergodic rate R #R↑ ergodic rate R 0.2 0.2 #R↑ 0.1 0 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0 0.2 0.4 0.6 0.8 1 ergodic rate R ergodic rate R 1 1

(a) RRSTSeq (b) RRSTSopt

Figure 2.11: Growth of the ergodic rate region with increasing number of relay nodes N = 1, 2,..., 12 for the equal and optimal time division case. In the left plot we depicted the maximal unidirectional ergodic rates according to Corollary 2.39 for N = 12.

Theorem 2.40. For bidirectional relaying with relay selection and equal time division we 2 assume independently identical distributed channel coefficients hk,n (0,σ ), equal γk+γR ∼ CN signal-to-noise ratios γR,n = γR, and coefficients λk = 2 for all k = 1, 2 and n = σ γkγR 1, 2,...,N. Then we can upper and lower bound the maximal unidirectional ergodic rate ∗ RkRSeq, k = 1, 2, as follows

−a ∗ 1 e 1 N RkRSeq − log 1+ ln , ≥ 2 λk a −b   ∗ e +b 1 N b 1 RkRSeq log 1+ ln( ) + log 1+ N ≤ 2 λk b 2 λk + ln    b  with arbitrary a, b (0,N). The asymptotic upper and lower bound meet  if we choose ∈ a and b 0 when N . Therefore, the growth of the maximal unidirectional → ∞ → → ∞1 ergodic rate is asymptotically equal 2 log(ln(N)).

Proof. The proof can be found in Appendix 2.8.26.

Note that the asymptote on the growth of the maximal ergodic unidirectional rate is indepen- 2 dent of λk and therefore independent of the the channel gain variance σ and signal-to-noise ratios γR and γk.

72 2.4 Relay Selection

2.5 Simulation

1 Lower Bound 2 Upper Bound

1.5

1

0.5 Maximal Ergodic Rate R

0 0 1 2 3 4 5 10 10 10 10 10 10 Number of Relay Nodes N

∗ Figure 2.12: Growth of the maximal unidirectional ergodic rate R1RSeq using relay selection with an increasing number of relay nodes with upper and lower bounds with optimized (in gray) and fixed coefficients (in black) with a = b = 1/2, γR = 2 1.3, γ1 = 1, and σ = 1.

Remark 2.41. Since the derivation applies to any AWGN achievable rate calculation of a system where a selection combining technique between N independently exponentially distributed SNRs is utilized, the scaling law of the growth of the ergodic rate of such a system has always a log(ln(N)) asymptote.

Since we get the coefficients a and b from the analysis in the proof, they have no physical meaning. Therefore, we can optimize the bounds for any fixed number of relay nodes N by optimizing the coefficients a and b. In Figure 2.12 we plotted the growth of the maximal ∗ unidirectional ergodic rate R1RSeq using relay selection with the number of relay nodes N (Monte Carlo Simulation) and the upper and lower bounds with optimized and fixed coeffi- cients. The bounds are loose but they have the same growth rates. Furthermore, we see that the bounds with the optimized coefficients (“slowly”) converge.

Finally, as a direct consequence of the previous theorem and the inequalities in (2.53) we can conclude on the asymptotic growth of the ergodic rate region . RRSTSeq Corollary 2.42. For bidirectional relaying using relay selection with time-sharing and equal time division in an iid Rayleigh fading scenario with γR,n = γR the sum of any ergodic rate pair on the boundary of the ergodic rate region grows with Θ(log(log(N))). RRSTSeq

In more detail, for any q Ê 0 we can asymptotically lower and upper bound the ∈ \ { } ∗ asymptotic growth of the sum-rate of any boundary rate pair RRSTSeq(q) as follows

R∗ (q) 1 R∗ (q) lim inf RSTSeq 1 , lim sup RSTSeq 1 1. N→∞ log(ln(N)) ≥ 2 N→∞ log(ln(N)) ≤

73 2 Bidirectional Relay Communication using Superposition Encoding

The difference between the asymptotic lower and upper bound is exactly the difference be- tween a unidirectional protocol and the bidirectional protocol with an improved spectral effi- ciency. As we see in Figure 2.10, the increase in spectral efficiency depends on the rate ratio which vanishes in the case of maximal unidirectional ergodic rates. Finally, we want to re- mark that the maximal unidirectional ergodic rates evolve according to the same asymptotic scaling law as found in [DSG+03] using distributed beamforming approach with a two-phase separation constraint.

Optimal Time Division

Let RSTSopt(h) denote the bidirectional achievable rate region using relay selection with time-sharingR and optimal time division between the phases for the channel state h according ∗ to (2.49). Then let RSTSopt(q, h) denote the set of optimal achievable rates for a weight vector q and channelR state h. As for the equal time division case, we characterize the ergodic rate region by the rate pairs on its boundary. Therefore, we choose for any channel state h a rate pair in ∗ (q, h). However, if ∗ (q, h) is not a singleton, we have to take RRSTSopt RRSTSopt any possible rate allocation into account. Again, we sum this up with the definition of a rate allocation policy. For a weight vector q let Ξopt(q) denote a rate allocation policy R(h) h that decides for any channel realization h for a rate pair R(h) ∗ (q, h). Then ∈ RRSTSopt 

∗ 2 E (q) := R Ê : there exists a policy Ξ (q) with R = R(h) RRSTSopt ∈ + opt n 2 o denotes the set of ergodic rates we can achieve for a weight vector q Ê 0 . Therewith, ∈ + \{ } we can express the ergodic rate region as follows

2 2 Ê := co [R , R ] Ê : there exists q 0 with RRSTSopt 1 2 ∈ + ∈ + \ { } n R R , R R , [R , R ] ∗ (q) . 1 ≤ 1 2 ≤ 2 1 2 ∈ RRSTSopt ∗ o In the following let RRSTSopt(q) RSTSopt denote a rate pair on the boundary that ∈ R 2 achieves the weighted rate sum maximum with weight vector q Ê 0 , this means ∈ + \ { } we have R∗ (q)qT = max RqT . Due to the time-sharing operation (con- RSTSopt R∈RRSTSopt vex hull) the rate pair need not be unique. Clearly, the ergodic rate region of relay selection with time-sharing and optimal RRSTSopt time division grows as well with the number of relay nodes. In Figure 2.10 (b) we illustrate the enlargement for iid Rayleigh fading channels and equal relay powers. We see a similar behavior as for the equal time division case. For the derivation of the growth we can make use of the asymptotic result of the maximal unidirectional ergodic rates for the equal time division case. To this end, we upper and lower bound in the next proposition the sum of any rate pair on the boundary of in terms of the ergodic maximal unidirectional rates RRSTSopt for the equal time division case.

74 2.5 Piggyback a Common Relay Message

Proposition 2.43. For bidirectional relaying using relay selection with time-sharing and optimal time division we can upper and lower bound the sum-rate of any boundary rate pair R∗ (q) of the ergodic rate region as follows RSTSopt RRSTSopt 2 ∗ ∗ R∗ q ∗ min R1RSeq, R2RSeq RSTSopt( ) 1 2 RkRSeq. (2.54) ≤ ≤ k=1  P Proof. The proof can be found in Appendix 2.43.

With the upper and lower bound we can directly apply the asymptotic result for the ergodic ∗ maximal unidirectional rates RkRSeq of Theorem 2.40 as we did for Corollary 2.42. For bidirectional relaying using relay selection with time-sharing and equal time division in an iid Rayleigh fading scenario with γR,n = γR the sum of any ergodic rate pair on the boundary of the ergodic rate region grows with Θ(log(log(N))). In more detail, in RRSTSeq the next corollary we can lower and upper bound the asymptotic growth of the sum-rate of ∗ any boundary rate pair R (q) for any q Ê 0 . RSTSeq ∈ \ { } Corollary 2.44. For bidirectional relaying using relay selection with time-sharing and equal time division in an iid Rayleigh fading scenario with γR,n = γR the sum of any ergodic rate pair on the boundary of the ergodic rate region RSTSopt grows with Θ(log(log(N))). In 2 R

Ê 0 more detail, for any q + we can asymptotically lower and upper bound the growth ∈ \ { } ∗ of the sum-rate of any boundary rate pair RRSTSopt(q) as follows

R∗ (q) 1 R∗ (q) lim inf RSTSopt 1 , lim sup RSTSopt 1 2. N→∞ log(ln(N)) ≥ 2 N→∞ log(ln(N)) ≤

It is interesting to see that although the ergodic rate region of the optimal time division case is always larger than for the equal time division case, the sum of any ergodic rate pair has the same asymptotic scaling law.

2.5 Piggyback a Common Relay Message

Nowadays, there is a trend to offer multiple wireless services at a single device, which is known as the convergence of wireless services. Up to now this is realized by the coexistence of multiple wireless transceiver chains each equipped with an own antenna. This requires a careful radio segmentation with adequate transmit spectrum masks that allow a sufficient iso- lation of the receivers to the transmitters with respect to the receivers sensitivity levels. With a convergence on the Data Link Layer and Physical Layer we can overcome such practical problems. The joint design on the Data Link Layer and Physical Layer allows the reduction

75 2 Bidirectional Relay Communication using Superposition Encoding of the number of transceiver chains in the device. Moreover, the reduction of RF front-ends is interesting for further miniaturization of the devices. In addition it allows a more efficient joint resource allocation, which results in a reduction of the energy consumption.

Accordingly, in this section we add a relay multicast communication to the bidirectional relaying protocol. This means that we assume that the Network Layer assigns two routing tasks to Data Link Layer. Accordingly, we are interested in an efficient joint resource allo- cation design for both routing tasks across the Physical and Data Link Layer. We consider again superposition encoding, which means that the relay node encodes its own message and superimposes the codeword of the relay multicast message on the bidirectional broadcast transmit signal. In accordance to this we say that the relay messages is piggybacked on the bidirectional relaying.

In the seminal work [GK00] Gupta and Kumar introduce the concept of transport capacity, which is a measure that factors in the distance between the source and destination pairs in a wireless network. The mean feat is to use this measure to derive upper and lower bounds of scaling laws which characterize the amount of information a network can transport in the limit of large number of nodes. A weak point of the work is that they considered concurrent transmissions as interference so that in [GK03, XK04] Gupta, Xie, and Kumar consider interference as information and therewith improve the scaling laws by studying large relay networks. In this context they raised the fundamental question “How should nodes cooperate in maximizing information transfer in a wireless network?” In [OLT07] Özgür, Lévêque, and Tse achieve a linear scaling law with a hierarchical cooperation scheme using distributed MIMO communication. Recently, in [XK07] Xie and Kumar extend their coding scheme to multi-source, multi-destination, multi-relay networks where they group nodes along multi- relay routes. Thereby, they merge routes if they intersect at any relay node so that they can apply a joint backward decoding scheme. They point out that the coding scheme depends on the topology and note that such a coding scheme excludes two-way multi-relay networks.

The afore mentioned works study information theoretic coding strategies for large relay net- works. Since it is a hard problem to find the optimal coding strategy for an arbitrary net- work, for most networks the optimal communication strategy is not known. However, the promising benefits of already proposed relaying concepts for wireless networks encourage researcher to study routing, media access, and power control for such problems. Accord- ingly, there is recently a vast growing literature on power control problems for wireless cel- lular and multi-hop networks which considers the joint optimization of routing, scheduling, and power control problems, which allows the development of efficient centralized and dis- tributed resource allocation algorithms. In [Bam98] Bambos points out that general power control design goals for wireless networks are to prolong battery life, mitigate interference, and maintain link quality. For the design of resource allocation policies usually a network flow model based on flow conservation is assumed. This means that separated information flows are considered. Then the optimization is done using utility functions per user, which

76 2.5 Piggyback a Common Relay Message are often assumed to be continuous, differentiable, concave, and increasing, e.g. the capacity function of a Gaussian channel. Then the main goal is to maximize the sum of the user util- ity functions, which is called the network utility maximization problem. In [XJB04], Xiao, Johansson, and Boyd introduce a generic formulation of an optimization problem for the si- multaneous routing and power allocation problem for wireless networks, which allows them to derive efficient solution methods based on convex optimization theory. Algorithms which compute distributed or centralized power control solution with respect to routing and/or link scheduling for multi-hop networks can be found for instance, in [TE02, CS03, Chi04]. While in [NMR05] Neely, Modiano, and Rohrs study a dynamic routing and power allocation pol- icy for wireless networks with time-varying channels based on the maximum differential backlog strategy of Tassiulas and Ephremides [TE93]. For an introduction in the theory and algorithms of resource allocation in wireless networks with a more comprehensive literature survey on this topic we refer on the textbook [SWB06].

However, our goal in this section is not to find another algorithm which solves efficiently a power or rate allocation problem. We are interested in finding some properties of the achiev- able rate region, which then could be used for improving the efficiency of a resource alloca- tion policy according to some higher layer strategies. Moreover, we can identify the optimal decoding order at nodes 1 and 2 in the BC phase. Since we consider two simple routing tasks and single-antenna nodes, some of the following results can be astonishingly obtained in closed form. But we see from the derivations that this is already a tedious combinato- rial problem so that we suppose that for joint optimization of more or more complicated13 routing tasks the resource allocation problems can only be solved algorithmically.

In the following section we extend the bidirectional broadcast by an additional relay message. We characterize the optimal decoding order and the total sum-rate maximum which can be achieved with both routing tasks. Moreover, we identify bidirectional rate pairs which result in the same total sum-rate so that we know how to interchange additional relay rate with bidirectional rate. The explicit characterization leads to combinatorial problems which we discuss for the equal time division and for h1 > h2 . This allows us to characterize for a desired relay rate the bidirectional rate pair| which| | results| in the largest bidirectional sum-rate. Throughout this section we illustrate the main results and the combinatoric with representative examples for a clear presentation of the arguments.

Most closed form results are obtained for the equal time division case, cf. Remark 2.4. However, the behavior will be similar for other fixed time division cases. According to this we study in the latter part of the section the maximal sum-rates with respect to the time division parameter. In the end we present for two examples the achievable rate regions for

13Already for the routing task where the relay node adds individual messages for nodes 1 and 2 to the bidi- rectional relaying protocol we have 3! = 6 possible decoding orders at nodes 1 and 2, which results in 36 different cases to consider. For comparison, for the here considered common relay message we have 2! = 2 decoding orders each node, which results in 4 different cases where one is always optimal, c.f. Theorem 2.45.

77 2 Bidirectional Relay Communication using Superposition Encoding the equal and optimal time division case. For comparison we also depicted the achievable rate region with a simple energy-equivalent TDMA approach which realizes the same routing tasks. This illustrates the efficiency and the new established rate trade-off possibilities gained from the joint resource allocation approach.

2.5.1 Broadcast Phase with Relay Multicast

In this section, we extend the bidirectional relaying protocol by an additional relay multicast communication. This means that the relay node wants to transmit an independent common message to nodes 1 and 2. The additional relay multicast and the bidirectional broadcast are simultaneously performed in the BC phase of the bidirectional relay protocol. For the study of the problem it is enough to consider a network with one relay node only and time-invariant channels. In this subsection we assume an arbitrary but fixed time division parameter α ∈ [0, 1]. As described in Section 2.2.3, in the BC phase the relay node forwards the previously re- ceived message m1 to node 2 and message m2 to node 1. In addition to this, the relay node additionally encodes a relay message mR for nodes 1 and 2 with rate RR. For the trans- mission, we again follow the superposition encoding strategy. Since we have a memoryless Gaussian channel, it is sufficient to consider single-letters only. Accordingly, the random input variable of the relay node can be expressed as

XR = W1 + W2 + WR where the random variables W1, W2, and WR correspond to the codewords of messages m1, m2, and mR respectively. Since the messages are assumed to be independent, we consider independent random variables. From this we get the output at node k, k = 1, 2, as follows

Yk = hk XR + N1 = hk W1 + hk W2 + hk WR + Nk, k = 1, 2, where Nk denotes the independent additive complex Gaussian distributed noise at node k, k = 1, 2. Both nodes receive the signal of their own bidirectional message as interfer- ence. Therefore, before decoding the unknown messages each node subtracts the interfer- ence caused by its own message. This means that node 1 subtracts h1X1 and node 2 sub- tracts h2X2 so that for each node it remains to decode the bidirectional message from the other node and the common relay message. Accordingly, the non-negative achievable rates for the unknown messages have to fulfill the constraints R + R (1 α)I(X ; Y W ) = (1 α)I(W ; h W + h W + N ), (2.55a) 2 R ≤ − R 1| 1 − 2 1 2 1 R 1 R + R (1 α)I(X ; Y W ) = (1 α)I(W ; h W + h W + N ), (2.55b) 1 R ≤ − R 2| 2 − 1 2 1 2 R 2 R min (1 α)I(X ; Y W ) R , (1 α)I(X ; Y W ) R , (2.55c) R ≤ − R 1| 1 − 2 − R 2| 2 − 1  =:RR@1 =:RR@2 | {z } | {z }

78 2.5 Piggyback a Common Relay Message

for some input distributions fWk (wk), k 1, 2, R , satisfying the power constraint

2 2 2 ∈ { 2 }

E E E E X = W + W + W P . Thereby, the rates R and {| R| } {| 1| } {| 2| } {| R| } ≤ R R@1 RR@2 denote the achievable relay rates at nodes 1 and 2. Again, the mutual informations are coupled by the relay power distribution. This time we have to distribute the relay transmit power PR among three messages. Therefore, as before let β1 and β2 denote the proportion of relay transmit power PR spend for the codewords W1 and W2 and additionally let βR denote the proportion of relay transmit power PR spend for the codeword WR. Now, the relay transmit power constraint requires that β1+β2+βR 1 holds. For a feasible relay power distribution we know from Section 2.2.1 that complex≤ Gaussian distributed inputs W1 (0,β1PR), W2 (0,β2PR), and WR (0,βRPR) maximize the mutual informations∼ CN so that we have∼ CN ∼ CN

I(X ; Y W ) = log 1+ γ h 2(β + β ) , R 1| 1 R| 1| 2 R I(X ; Y W ) = log 1+ γ h 2(β + β ) . R 2| 2 R| 2| 1 R   In the following we look at the achievable rates R1, R2, and RR more explicitly. Therefore, in the next theorem we identify an always optimal decoding order at nodes 1 and 2. On that score, we first look at the case where each node decodes the additional relay message first. After a successful decoding of the relay message and before decoding of the unknown bidirectional message each node subtracts the interference caused by the additional relay message. Effectively, this means that the bidirectional relay communication is essentially interference-free. For that reason, for the bidirectional communication the rate constraints (2.7a) and (2.7b) apply so that for a desired bidirectional rate pair [R , R ] (α) 1 2 ∈ RBR ⊆ (1 α) we need at least − RBC R1 R2 2 1−α 1 2 1−α 1 β = − and β = − . (2.56) 1 h 2γ 2 h 2γ | 2| R | 1| R With this the power fraction β = 1 β β remains at most for the multicast communi- R − 1 − 2 cation. Accordingly, for a feasible bidirectional rate pair [R1, R2] BR(α) the maximal achievable rate of the additional relay multicast at nodes 1 and 2 is given∈ R by

2 βR h1 γR RR@1(R1, R2) = (1 α) log 1+ | | 2 , (2.57a) − 1+ β2 h1 γR  | 2 |  βR h2 γR RR@2(R1, R2) = (1 α) log 1+ | | 2 . (2.57b) − 1+ β1 h2 γR  | |  Since for a multicast both nodes should be able to decode the relay message, the maximal achievable relay rate is given by the minimum of (2.57a) and (2.57b). In the next theorem we show that this is the optimal decoding order and power distribution if we desire to achieve a certain feasible bidirectional rate pair.

79 2 Bidirectional Relay Communication using Superposition Encoding

Theorem 2.45. For a given rate pair [R , R ] (α) the maximal achievable additional 1 2 ∈ RBR relay rate RR is achieved if nodes 1 and 2 decode the additional relay message first. Then the maximal achievable additional relay rate is given by

RR(R1, R2) = min RR@1(R1, R2), RR@2(R1, R2) . (2.58)  Proof. The proof can be found in Appendix 2.8.28.

Since it is optimal for any desired bidirectional rate pair that at each node the relay message is decoded first, then its interference is canceled, and finally the unknown bidirectional mes- sage is decoded without any interference of the relay message we say that the common relay message is piggybacked on the bidirectional relay communication. Moreover, this implies that potentially existing resources at the relay node are used to add a multicast communica- tion on top of the bidirectional relaying. The achievable rate region of the bidirectional relaying protocol with an additional relay multicast for a fixed time division parameter α [0, 1] can be expressed as ∈ 3 (α) := [R , R , R ] Ê : [R , R ] (α), R R (R , R ) . RPiggy 1 2 R ∈ + 1 2 ∈ RBR R ≤ R 1 2 Since this applies for any time division parameter, for the optimal time division case we can achieve opt Piggy := Piggy(α). R α∈[0,1]R S 1 opt We depicted the achievable rate region Piggy( /2) and Piggy for two examples in Fig- ure 2.18 and Figure 2.19 in the end ofR this section. ButR first we want to identify more properties of the achievable rate region Piggy(α). In particular in the next subsection we characterize the sum-rate optimal rate tupleR which achieves the total sum-rate maximum.

2.5.2 Total Sum-Rate Maximum

Let RΣ = R1 + R2 denote the bidirectional sum-rate and let Rtot = R1 + R2 + RR specify the total sum-rate, which includes the additional relay rate. The optimization problem for the total sum-rate maximum for a time division parameter α is given by

∗ Rtot := max R1 + R2 + RR [R1,R2,RR]∈RPiggy(α)

= max R1 + R2 + RR(R1, R2). (2.59) [R1,R2]∈RBR(α)

∗ For the characterization of the total sum-rate maximum Rtot in Theorem 2.48 we need the following lemma and proposition. In Lemma 2.46 we first characterize the bidirectional

80 2.5 Piggyback a Common Relay Message

rate pair [R1, R2] with a fixed bidirectional sum-rate RΣ = R1 + R2 which maximizes the additional relay rate RR(R1, R2). Then with Proposition 2.47 we explicitly identify the optimal rate pair. In the next subsection we present an explicit discussion and some helpful illustrations of the following results for the equal time division case.

Lemma 2.46. Given a feasible bidirectional sum-rate RΣ, which means that at least one feasible rate pair [R , R ] (α) with R + R = R exists, then there are R⊲ and R⊳ 1 2 ∈ RBR 1 2 Σ 1 1 so that for all R with R⊲ R R⊳ we have [R , R R ] (α). Furthermore, the 1 1 ≤ 1 ≤ 1 1 Σ − 1 ∈ RBR maximal achievable additional relay rate for the desired bidirectional sum-rate RΣ is given by

max RR (RΣ) := max RR(R1, R2) [R1,R2]∈RBR(α), R1+R2=RΣ

RΣ (1 α) log h h γˆ 2 2(1−α) 1 R , if R⊲ R⋆ R⊳, (2.60a) − | 1 2| − − 2 Σ 1 ≤ 1 ≤ 1 ⊲   RΣ−R1 2 1 1−α ⊲ ⋆ ⊲ =  (1 α) log h2 (ˆγ 2 2 ) R1, if R1 < R1, (2.60b)  − | | − |h1| −  ⊳   R1  2 1 1−α ⊳ ⋆ ⊳ (1 α) log h1 (ˆγ 2 2 ) R + R , if R > R (2.60c) |h2| Σ 1 1 1  − | | − −   2  ⋆  1 1−α † † |h1| 1 1 with R := R R , R := log 2 , and γˆ := γ + 2 + 2 . The additional 1 2 Σ 2 |h2| R |h1| |h2| − max relay rate maximum RR (RΣ) is attained at the bidirectional rate pair

⋆ ⋆ ⊲ ⋆ ⊳ [R1, RΣ R1], if R1 R1 R1, ⊲ − ⊲ ⋆ ≤ ⊲ ≤ [R1(RΣ), R2(RΣ)] = [R , R R ], if R < R , (2.61)  1 Σ − 1 1 1 [R⊳, R R⊳], if R⋆ > R⊳. 1 Σ − 1 1 1  Proof. The proof can be found in Appendix 2.8.29.

The lemma characterizes for any bidirectional sum-rate RΣ the maximal achievable addi- tional relay rate Rmax(R ) and the corresponding rate pair [R (R ), R (R )] (α) R Σ 1 Σ 2 Σ ∈ RBR with R1(RΣ) + R2(RΣ) = RΣ. This allows us to rewrite the total sum-rate maximum problem (2.59) as follows

∗ max Rtot = max RR (RΣ)+ RΣ. (2.62) RΣ=R1+R2 [R1,R2]∈RBR(α) ∗ This means that for the total sum-rate optimum Rtot we have to find the optimal bidirectional ∗ max sum-rate RΣ which maximizes the function Rtot(RΣ) := RR (RΣ)+RΣ for feasible bidi- ⋆ rectional sum-rates. For the discussion of Rtot(RΣ) we need to know how R1 of Lemma 2.46 is related to the bidirectional rate region (α). RBR

81 2 Bidirectional Relay Communication using Superposition Encoding

Let BC(γR) denote the achievable broadcast rate region for a given signal-to-noise ra- R BC ⋆ ⋆ tio γR. Then let R (γR), R−→(γR), and R−→(γR) denote the maximum sum-rate and Σ R2 R1 the corresponding optimal rates of BC(γR) according to Proposition 2.2. The function BC R RΣ (γR) is obviously bijective on the domain of non-negative γR and the range of non- BC negative bidirectional sum-rates. Thus, there exists a unique inverse function γR (RΣ) with BC BC RΣ (γR (RΣ)) = RΣ for all feasible bidirectional sum-rates. Accordingly, we can define ⋆ ⋆ R−→(γR) and R−→(γR) in terms of RΣ as follows R2 R1 ⋆ ⋆ BC ⋆ ⋆ BC R−→(RΣ) := R−→(γ (RΣ)) and R−→(RΣ) := R−→(γ (RΣ)) R2 R2 R R1 R1 R ⋆ ⋆ with R−→(RΣ)+ R−→(RΣ)= RΣ as well as the corresponding broadcast rate region R2 R1 (R ) := (γBC(R )). RBC Σ RBC R Σ For a bidirectional rate pair [R , R ] (α) = α (1 α) with sum-rate 1 2 ∈ RBR CMAC ∩ − RBC R + R = R we have [ R1 , R2 ] so that the relay signal-to-noise ratio γ has to 1 2 Σ 1−α 1−α ∈ RBC R BC RΣ ⋆ be larger or equal to γR ( 1−α ). The next proposition shows that R1 of Lemma 2.46 for a ⋆ RΣ feasible bidirectional sum-rate RΣ specifies the first sum-rate optimal rate (1 α)R−→ − R2 1−α of a corresponding scaled BC rate region (1 α) RΣ according to (2.10b) if R − RBC 1−α Σ (respectively γ ) is large enough, which means that we have β⋆ [0, 1]. R  ∈ Proposition 2.47. The sum-rate optimal rate pair with sum-rate RΣ of the broadcast rate region (1 α) ( RΣ ) is given by the vector-valued function − RBC 1−α [R⋆(R ), R⋆(R )], if R (1 α) R† , (2.63a) 1 Σ 2 Σ Σ ≥ − | |

⋆ 2 † Ê R : Ê+ , RΣ [R , 0], if R < (1 α)R , (2.63b) BC → + 7→  Σ Σ − −  [0, R ], if R < (1 α)R†, (2.63c) Σ Σ − 2 ⋆ 1 1−α † ⋆ 1 1−α † † |h1| with R (RΣ)= RΣ R , R(RΣ) := RΣ + R , and R = log 2 . 1 2 − 2 2 2 2 |h2| Proof. The proof can be found in Appendix 2.8.30.

The function RBC(RΣ) of Proposition 2.47 defines for any bidirectional sum-rate RΣ the unique sum-rate optimal rate pair of the rate region (1 α) ( RΣ ) of the BC phase. This − RBC 1−α allows us to identify for a desired bidirectional sum-rate RΣ the rate pair where the maximal max additional relay rate RR (RΣ) is attained, cf. (2.61) of Lemma 2.46, explicity. With this we can characterize the total sum-rate maximum for a desired bidirectional sum-rate, Rtot(RΣ). Let us assume that the sum-rate RΣ is feasible, which means that there exists at least one bidirectional rate pair with the desired sum-rate so that the intersection of (α) with the RBR graph f of the function fR : [0, RΣ] [0, RΣ] with R1 RΣ R1 is non-empty. G RΣ Σ → 7→ − Then, we have to distinguish between the following cases:

82 2.5 Piggyback a Common Relay Message

max ⋆ ⋆ 1. The maximal additional relay rate RR (RΣ) is attained at [R1(RΣ), R2(RΣ)] ⋆ if the intersection point between fRΣ (R1) and RBC(RΣ) is achievable, i.e. ⋆ ⋆ [R1(RΣ), R2(RΣ)] BR(α). Then with (2.60a) the total sum-rate can be expressed as ∈ R

RΣ RΣ R (R )= Rmax(R )+R = (1 α) log 2 2(1−α) h h γˆ 2 2(1−α) . (2.64a) tot Σ R Σ Σ − | 1 2| −   2. Otherwise, if we have [R⋆(R ), R⋆(R )] / (α) for a feasible bidirectional sum- 1 Σ 2 Σ ∈ RBR rate R , we have to characterize R⊲ and R⊳ from the intersection of (α) with the Σ 1 1 RBR graph f . G RΣ a) If † −→ , we have ⊲ and ⋆ ⊲. There- RΣ < min (1 α)R , αR2R R1 = 0 R1(RΣ) < R1 { − } max ⋆ fore, the maximal additional relay rate RR (RΣ) is attained at RBC(RΣ) = [0, R ] (α). Then with (2.60b) the total sum-rate can be expressed as Σ ∈ RBR 2 RΣ RΣ |h2| 1−α 2 1−α Rtot(RΣ) = (1 α) log 2 2 γˆ h1 2 . (2.64b) − |h1| | | −   b) If R > min αR−→, 2αR−→ (1 α)R† R > αR−→ R⋆(R ) < Σ { 2R 2R − − } ⇔ Σ 2R ∧ 1 Σ R αR−→, the line f (R ) intersects the individual MAC rate constraint Σ − 2R RΣ 1 αR−→ so that we have R⊲ = R αR−→ and R⋆(R ) < R⊲. Accordingly, 2R 1 Σ − 2R 1 Σ 1 the maximal additional relay rate Rmax(R ) is attained at [R⊲, R R⊲] = R Σ 1 Σ − 1 −→ −→ . Then with (2.60b) the total sum-rate can be [RΣ αR2R, αR2R] BR(α) expressed− as ∈ R

α α |h |2 R−→ R−→ 2 1−α 2R 2 1−α 2R Rtot(RΣ) = (1 α) log 2 2 γˆ h1 2 . (2.64c) − |h1| | | −   c) If † −→ , we have ⊳ and ⋆ RΣ < min (1 α)R , αR1R R1 = RΣ R1(RΣ) > ⊳ {− − } max R1. Therefore, the maximum additional relay rate RR (RΣ) is attained at ⋆ RBC(RΣ)=[RΣ, 0] BR(α). Then with (2.60c) the total sum-rate can be expressed as ∈ R

2 RΣ RΣ |h1| 1−α 2 1−α Rtot(RΣ) = (1 α) log 2 2 γˆ h2 2 . (2.64d) − |h2| | | −   d) If R > min αR−→, 2αR−→ + (1 α)R† R > αR−→ R⋆(R ) < Σ { 1R 1R − } ⇔ Σ 1R ∧ 2 Σ R αR−→, the line f (R ) intersects the individual MAC rate constraint αR−→ Σ− 1R RΣ 1 1R so that we have R⊳ = R αR−→ and R⋆(R ) > R⊳. Accordingly, the maximal 1 Σ − 1R 1 Σ 1 additional relay rate Rmax(R ) is attained at [R⊳, R R⊳]=[αR−→, R R Σ 1 Σ − 1 1R Σ − αR−→] (α). Then with (2.60c) the total sum-rate can be expressed as 1R ∈ RBR α α |h |2 R−→ R−→ 1 1−α 1R 2 1−α 1R Rtot(RΣ) = (1 α) log 2 2 γˆ h2 2 . (2.64e) − |h2| | | −  

83 2 Bidirectional Relay Communication using Superposition Encoding

† 2 2 Note that if we have R < 0 h1 < h2 , the case 2. a) is not possible. If the other cases occur depend on the scenario⇔ | specific| | parameters.| Similarly, we can a priori exclude the case 2.c) if we have R† > 0 h 2 < h 2. ⇔| 1| | 2| We have now specified the total sum-rate for any feasible bidirectional sum-rate. There- max max with, we can define section-wise a function Rtot(RΣ) on the range [0, RΣ ], where RΣ denotes the maximal feasible bidirectional sum-rate. This allows us to characterize in the opt opt ∗ next theorem the bidirectional rate pair [R1 , R2 ] where the total sum-rate maximum Rtot according to (2.62) is achieved.

Theorem 2.48. For a given time division parameter α [0, 1] the total sum-rate maximum ∈ opt opt R∗ of the rate region (α) is attained at the bidirectional rate pair [R , R ] where tot RPiggy 1 2 the function R⋆ (R ) intersects the boundary of the bidirectional rate region (α). BC Σ RBR

Proof. The proof can be found in Appendix 2.8.31.

From the proof of the theorem and from the (2.64c) and (2.64e) we see that for the cases 2. b) and 2. d) the total sum-rate remains constant for a range of large bidirectional sum- opt opt max rates, R1 + R2 RΣ RΣ . This means that we can interchange additional relay rate for bidirectional≤ sum-rate≤ without losing total sum-rate optimality. The next corollary records this observation and states that such an interchange between additional relay rate and bidirectional rate exists not only for the total sum-rate maximum.

Corollary 2.49. For any sum-rate R Ropt + Ropt with the rate pair [R⋆, R⋆] := Σ ≤ 1 2 1 2 [R⋆(R ), R⋆(R )]=[ 1 R 1−α R†, 1 R + 1−α R†] the rate tuples 1 Σ 2 Σ 2 Σ − 2 2 Σ 2 ⋆ ⋆ ⋆ ⋆ [R1, R2, RR]=[R1 + Rx, R2, RR(R1 + Rx, R2)] with Rx 0 and [R⋆ + Rx, R⋆] (α) and ≥ 1 2 ∈ RBR ⋆ ⋆ ⋆ ⋆ [R1, R2, RR]=[R1, R2 + Ry, RR(R1, R2 + Ry)] with Ry 0 and [R⋆, R⋆ + Ry] (α) achieve the same total sum-rate. ≥ 1 2 ∈ RBR

Proof. The proof can be found in Appendix 2.8.32.

The corollary characterizes the bidirectional rate pairs where the total sum-rate remains con- opt opt ⋆ ⋆ stant. For a bidirectional sum-rate RΣ R1 + R2 there exists the rate pair [R1, R2] which determines the rate pairs where the≤ total sum-rate remains constant. Then the corollary states that we can either increase R1 or R2. For a constant total sum-rate this means that if we increase one bidirectional rate, we equally decrease the relay multicast rate. Thereby, the ⋆ ⋆ interchange range follows from the condition that the bidirectional rate pairs [R1 + Rx, R2]

84 2.5 Piggyback a Common Relay Message

⋆ ⋆ or [R1, R2 + Ry] have to be within BR(α) with appropriate Rx, Ry 0. However, if we increase both bidirectional rates weR know from Theorem 2.48 that we≥ increase the total ∗ sum-rate. At the total sum-rate optimum Rtot there may no interchange or interchange with only one bidirectional rate possible. For a better understanding we briefly discuss the low and high bidirectional sum-rate cases next.

For low sum-rates R where we have R⋆(R )+R⋆(R ) < R† we have a negative R⋆(R ) Σ 1 Σ 2 Σ | | 1 Σ iff h 2 < h 2 and a negative R⋆(R ) iff h 2 < h 2. If R⋆(R ) < 0 we can only | 1| | 2| 2 Σ | 2| | 1| 1 Σ interchange relay rate in the direction R since for any rate Ry 0 the rate pair [R⋆, R⋆ + 1 ≥ 1 2 Ry] / (α). Furthermore, for a rate pair within the bidirectional rate region we need ∈ RBR Rx R⋆. Similarly, we can interchange relay rate in the direction R only if R⋆(R ) is ≥ 1 2 2 Σ negative.

⋆ max ⋆ max If we have [R1(RΣ ), R2(RΣ )] BR(α), the rate pair achieves the bidirectional sum- ⋆ max ⋆ max∈ R max rate maximum R1(RΣ )+ R2(RΣ )= RΣ , which means that the rate pair is also bidi- rectional sum-rate optimal. We see that this is the case iff the intersection point of the func- tion R (R ) with the boundary of (α) coincides with the intersection of R (R ) BC Σ RBR BC Σ with the boundary of (1 α) or the sum-rate constraint of the MAC region α . − RBC RMAC Since the rate pair characterizes a sum-rate optimum of a BC rate region it follows that in this case no interchange without loosing total sum-rate optimality is possible. In the next subsection we elaborate the combinatorial discussion on the previous results.

2.5.3 Combinatorial Discussion and Working Examples

In this section we present some combinatorial discussions of the achievable rate region using the previous results. We start with an explicit study of the equal time division case. After that we fix the additional relay rate and look for achievable bidirectional rate pairs. Then we discuss the total sum-rate maximum with respect to the time division parameter α. Finally, we compare the achievable rate regions with the achievable rate region of a simple TDMA approach which realizes the same routing tasks.

Equal Time Division

For the equal time division case we can explicitly express the total sum-rate optimal rate pairs and describe the possible rate trade-offs. The explicit characterization of the combinatorial results leads to simple arithmetical problems. Because of the symmetry we do the discussion 2 2 for case h1 h2 . We first specify the combinatorial cases for which we characterize the total sum-rate| | ≥| optimality| ranges. If we interchange the indices 1 and 2 an analog discussion gives the results for the case h 2 h 2. | 1| ≤| 2|

85 2 Bidirectional Relay Communication using Superposition Encoding

1 1

γ =1.5 γ =2 1 1 0.8 γ =0.4 0.8 γ =1.3 2 2 0.6 0.6 [bit/channel use] [bit/channel use] 2 2 0.4 0.4 rate R rate R

0.2 0.2

0 0 0 0.5 1 0 0.5 1 rate R [bit/channel use] rate R [bit/channel use] 1 1

1 1

γ =0.4 γ =1 1 1 0.8 γ =3.8 0.8 γ =2.5 2 2 0.6 0.6 [bit/channel use] [bit/channel use] 2 2 0.4 0.4 rate R rate R

0.2 0.2

0 0 0 0.5 1 0 0.5 1 rate R [bit/channel use] rate R [bit/channel use] 1 1

2 2 Figure 2.13: For h1 h2 we can distinguish between four possible cases where ⋆ | | ≥ | | R (γ ) (solid line) intersects the boundary of 1/2 (dashed line). Ad- BC R CMAC ditionally, we depicted broadcast rate regions of selected relay powers (dashed- dotted line). The cases are specified by the intersection points £, , ♦, and , ⋆ ◦ where the function RBC(γR) intersects the two individual rate constraints and the sum-rate constraint of the MAC region. For the intersection of the first in- dividual rate constraint we additionally have to differentiate whether in the BC phase the unidirectional communication is sum-rate optimal. This is the case if the rate pair ¡ is not achievable in the MAC phase, i.e. ¡ / 1/2 . Fi- ∈ CMAC nally, the rate pairs ▽ and △ denote the vertices of the MAC region 1/2 MAC respectively. C

86 2.5 Piggyback a Common Relay Message

For h 2 h 2 we have R† 0 so that there are four cases where and how the function | 1| ≥ | 2| ≥ R⋆ (R ) intersects the boundary of the MAC rate region 1 . The four cases depend BC Σ 2 CMAC on the channel realizations and power constraints of nodes 1 and 2. In Figure 2.13 we depict the cases for four representative examples with some characteristic rate pairs. In accordance to that we can characterize the four cases as follow:

UL (upper left): The function R⋆ intersects the individual rate constraint 1 −→ for BC(RΣ) 2 R2R 2 1 1 † |h1| 1 1 the case (2.63c) R−→ < R γ2 > 2 ( 2 2 ). ⇔ 2 2R 2 ⇔ |h2| |h2| − |h1|

UR (upper right): The function R⋆ intersects the individual rate constraint 1 −→ BC(RΣ) 2 R2R for the case (2.63a) 1 R−→ 1 R† 1 R−→ 1 R† 1 R2Σ = 1 (RMAC R−→). ⇔ 2 2R ≥ 2 ∧ 2 2R − 2 ≤ 2 1 2 Σ − 2R

LL (lower left): The function R⋆ intersects the individual rate constraint 1 −→ for BC(RΣ) 2 R1R the case (2.63a) 1 R−→ 1 R† 1 R−→ + 1 R† 1 RΣ1 = 1 (RMAC R−→). ⇔ 2 2R ≥ 2 ∧ 2 1R 2 ≤ 2 2 2 Σ − 1R

⋆ 1 MAC LR (lower right): The function RBC(RΣ) intersects the sum-rate constraint 2 RΣ for the case (2.63a) 1 R−→ 1 R† RMAC < min 2R−→ R†, 2R−→ + R† . ⇔ 2 2R ≥ 2 ∧ Σ { 2R − 1R } ∗ For the identification of the rate pair where the total sum-rate optimum Rtot is achieved ac- ⋆ cording Theorem 2.48 we need to know the intersection point between RBC(RΣ) and the boundary of BReq. If the intersection point with the boundary of the MAC rate region 1 R 1 2 MAC is within 2 BC it coincides with the intersection point with the boundary of BReq. C R 1 R Otherwise, we find the intersection point on the boundary of the rate region 2 BC, which is 1 ⋆ 1 ⋆ R given by [ R−→, R−→] according to Proposition 2.2. As a consequence, we have to charac- 2 R2 2 R1 terize for each of the previous cases the condition that the intersection point is within the BC rate region. This is the case iff

2 1 1 |h2| UL: R−→(1) R−→ γR 2 γ2, 2 R1 ≥ 2 2R ⇔ ≥ |h1|

2 2 1 ⋆ 1 2R 2R γ1|h1| |h2| UR: R−→(1 β ) R−→ γR γ with γ = 2 2 + γ2 2 , 2 R1 − ≥ 2 2R ⇔ ≥ R R (1+γ2|h2| )|h2| |h1|

2 2 1 ⋆ 1 1R 1R γ2|h2| |h1| LL: R−→(β ) R−→ γR γ with γ = 2 2 + γ1 2 , 2 R2 ≥ 2 1R ⇔ ≥ R R (1+γ1|h1| )|h1| |h2|

2 2 1 BC 1 MAC Σ Σ 1+γ1|h1| +γ2|h2| 1 1 LR: R R γR γ with γ = 2 2 2 2 2 , 2 Σ ≥ 2 Σ ⇔ ≥ R R |h1| |h2| − |h1| − |h2| q where we solved the conditions for γR. To sum up the discussion on the intersection point for the equal time division case with h 2 h 2 we now explicitly characterize the total | 1| ≥ | 2| sum-rate optimal rate pair according to Theorem 2.48 using the previous case definitions as

87 2 Bidirectional Relay Communication using Superposition Encoding follows

2 1 |h2| [0, R−→(1)], UL with γR < 2 γ2, (2.65a) 2 R1 |h1| 2  1 |h2| [0, R−→], UL with γR 2 γ2, (2.65b)  2 2R ≥ |h1|  † opt opt  [ 1 R−→ 1 R , 1 R−→], UR with γ γ12, (2.65c) [R , R ]=  2 2R 2 2 2R R R 1 2  − ≥  [ 1 R−→, 1 R−→ + 1 R†], LL with γ γ21, (2.65d)  2 1R 2 2R 2 R ≥ R 1 MAC 1 † 1 MAC 1 † Σ  [ 2 RΣ 4 R , 2 RΣ + 4 R ], LR with γR γR, (2.65e)  − ≥  [ 1 R−→(β⋆), 1 R−→(β⋆)], else. (2.65f)  2 R2 2 R1   Then the total sum-rate optimal relay rate RR results from (2.58) accordingly. Since UL is the case where [R⋆(R ), R⋆(R )] / 1 for any R , for the cases (2.65a) and (2.65b) 1 Σ 2 Σ ∈ 2 CMAC Σ we have a total sum-rate optimal bidirectional rate pair with R1 = 0. This means that for the case UL there exists a unidirectional rate allocation which is total sum-rate optimal.

According to Corollary 2.49 in some cases we can increase one bidirectional rate by de- opt opt creasing the relay rate. Therefore, we need that [R1 + Rx, R2 ] for any Rx > 0 or opt opt [R1 , R2 + Ry] for any Ry > 0 is within BReq. This is impossible if the intersection point is on the boundary of the BC rate region,R which corresponds to the cases (2.65a) and 1 MAC (2.65f), or the intersection is specified by the sum-rate constraint /2RΣ of the MAC rate region 1/2 , which corresponds to the case (2.65e). In all these cases we cannot further CMAC increase the bidirectional sum-rate, which obviously implies that we cannot increase one bidirectional rate. As a consequence it follows that in the cases (2.65a), (2.65e), and (2.65f) the total sum-rate rate pair is unique so that we can say that no interchange is possible without loosing total sum-rate optimality.

Moreover, for the cases (2.65a) and (2.65f) the intersection point is on the boundary of the BC rate region so that we have β1 + β2 = 1 and it follows that the additional relay rate RR is equal to zero. This means that if γR is small enough the intersection point with the boundary of coincides with the intersection of the boundary of the BC rate region 1 . For RBReq 2 RBC that reason we can say that at low signal-to-noise ratios γR it is total sum-rate optimal not to have an additional relay multicast communication. Furthermore, if the signal-to-noise ratio γR is that small that the case (2.65a) applies, we can only achieve the total sum-rate with rates R1 = 0 and RR = 0. This means in this case it is also necessary for total sum-rate optimality to have a relay communication in one direction only.

In the case (2.65b) the unidirectional relay communication is total sum-rate optimal as well, however we have a positive additional relay rate RR. From Corollary 2.49 we know that for 1 any interchange rate x with x −→ we can interchange relay rate R 0 [R , 2 R2R] BReq RR = 1 ≥ ∈ R x −→ with bidirectional rate x without loosing total sum-rate optimality, RR(R , 2 R2R) R1 = R 1 1 which means that we have x −→ x −→ ∗ const. Obviously, we R + 2 R2R + RR(R , 2 R2R) = Rtot =

88 2.5 Piggyback a Common Relay Message

1 need that R (Rx, R−→) 0 is satisfied. The maximum relay rate for the total sum-rate R 2 2R ≥ optimum is attained at the bidirectional rate pair of the intersection point 1 −→ . Since we [0, 2 R2R] 1 1 have x −→ −→ x it follows that we can increase x at most up RR(R , 2 R2R) = RR(0, 2 R2R) R R 1 − 1 to the maximum relay rate −→ . Furthermore, since x −→ has to be feasible, RR(0, 2 R2R) [R , 2 R2R] we can increase R at most up to maximum rate 1 R2Σ, if ν . To sum this up, 1 2 1 2Σ ∈ RBC for the case (2.65b) the total sum-rate optimality range with an interchange rate Rx can be expressed as

1 1 x −→ x −→ [R1, R2,RR]=[R , 2 R2R, RR(R , 2 R2R)] (2.66) 1 1 2Σ Rx 0, min R (0, R−→), R . ∈ { R 2 2R 2 1 }   1 1 In the case (2.65c) with x we can interchange relay rate −→ † R 0 RR = RR( 2 R2R 2 R + 1 ≥ 1 1 − x −→ with bidirectional rate −→ † x as well. As before we need a R , 2 R2R) R1 = 2 R2R 2 R + R 1 1 −1 1 non-negative relay rate −→ † x −→ and 2Σ. Then with RR( 2 R2R 2 R + R , 2 R2R) 0 R1 2 R1 similar arguments it follows that for− the case (2.65c) the total≥ sum-rate optimality≤ range with an interchange rate Rx can be expressed as

1 1 † 1 1 1 † 1 −→ x −→ −→ x −→ [R1, R2, RR]= 2 R2R 2 R + R , 2 R2R, RR( 2 R2R 2 R + R , 2 R2R) − − (2.67) 1 1 † 1 1 2Σ 1 1 † Rx 0, min R ( R−→ R , R−→), R R−→ + R .  ∈ { R 2 2R − 2 2 2R 2 1 − 2 2R 2 }  

Finally, in the case (2.65d) with Ry 0 we can interchange relay rate RR = 1 1 1 ≥ 1 1 −→ −→ † y with bidirectional rate −→ † y. For RR( 2 R1R, 2 R1R + 2 R + R ) R2 = 2 R1R + 2 R + R 1 1 1 1 this case we need again −→ −→ † y and Σ1. Similarly as RR( 2 R1R, 2 R1R + 2 R + R ) 0 R2 2 R2 before, it follows that for the case (2.65d) the total sum-rate≥ optimality≤ range with arbitrary interchange rate Ry can be expressed as

1 1 1 † 1 1 1 † [R1, R2, RR]= R−→, R−→ + R + Ry, RR( R−→, R−→ + R + Ry) 2 1R 2 1R 2 2 1R 2 1R 2 (2.68) 1 1 1 † 1 Σ1 1 1 † Ry 0, min RR( R−→, R−→ + R ), R2 R−→ R .  ∈ { 2 1R 2 1R 2 2 − 2 2R − 2 }  

In Figure 2.14 we illustrate the total sum-rate Rtot(R1, R2) with respect to the bidirectional rate pairs [R , R ] for the four different cases. The result of Corollary 2.49 is 1 2 ∈ RBReq shown by some contour lines. It shows that the total sum-rate optimum is attained at the intersection of R⋆ (R ) with the boundary of . Furthermore, we see that if the inter- BC Σ RBReq section point lies on one individual rate constraint of the MAC region, there is an optimality range where we can interchange relay rate with bidirectional rate in one direction without loosing total sum-rate optimality.

89 2 Bidirectional Relay Communication using Superposition Encoding

γ =1.5 γ =2 1 1 γ =0.4 γ =1.3 2 2 γ =1.4 γ =3.3 0.6 R 1 R

0.4

tot tot 0.5 R R 0.2

0 0 0.2 0.5 0.1 0.5 0.5 R 0 0 R R 0 0 R 2 1 2 1

γ =0.4 γ =1 1 1 γ =3.8 γ =2.5 2 2 γ =3 γ =1.7 R R 1 0.6

tot tot 0.4

R 0.5 R 0.2 0 0 1 0.5 0.5 0.5 0.2 0.1 R 0 0 R R 0 0 R 2 1 2 1

2 2 Figure 2.14: For h1 h2 and equal time division, α = 1/2, we see the total sum-rate | | ≥ | | ⋆ Rtot(R1, R2) for [R1, R2] BReq for the four possible cases where RBC(γR) ∈1 R intersects the boundary of 2 MAC. The total sum-rate contour lines illustrate the interchange property betweenC the additional relay rate and one bidirectional rate. Moreover, we see that the total sum-rate optimum is unique in the lower right figure only. In the upper figures we can interchange RR with R1 and in the lower left figure we can interchange RR with R2 without loosing total sum-rate optimality.

90 2.5 Piggyback a Common Relay Message

Desired Relay Rate

The explicit knowledge about the optimal rate pairs and the optimality ranges allows us to change the point of view and characterize for a desired relay rate RR the bidirectional rate pair [R (R ), R (R )] (α) which maximizes the bidirectional sum-rate, 1 R 2 R ∈ RBR

RΣ(RR) := max R1 + R2. [R1,R2]∈RBR(α) RR(R1,R2)=RR

This means we have RΣ(RR) = R1(RR) + R2(RR). Again we present the results for the case h 2 h 2. For the case h 2 h 2 the optimal bidirectional rate pair in a | 1| ≥ | 2| | 2| ≥ | 1| permuted order, i.e. [R2(RR), R1(RR)], follows immediately by interchanging the indices 1 and 2. However, this time we do the combinatorial discussion for an arbitrary but fixed time division parameter α [0, 1]. ∈

With increasing bidirectional rates the parameter βR decreases. It follows that the relay rate RR decreases with increasing bidirectional rates so that the desired relay rate is obvi- max ously bounded by the maximal possible relay rate RR := RR(0, 0). At high relay rates, opt opt where we have RR RR(R1 , R2 ), the optimal bidirectional rate pairs are specified ⋆ ≥ by the function RBC(RΣ). For lower desired relay rates in some cases we can addition- ally apply Corollary 2.49 to increase the bidirectional rate sum-rate of the intersection point opt opt [R1 , R2 ] while the total sum-rate remains constant. In the following we discuss the cases in more detail.

First we look at the case (2.63c) where the BC sum-rate optimal rate pair is on the R2-axis. This means that we consider relay rates larger than R (0, min (1 α)R†, αR−→ ). Since R { − 2R} we have R (R ) = 0 for such relay rates, it follows that R = R (R ) min (1 1 R Σ 2 R ≤ { − α)R†, αR−→ . We get R (R ) if we solve (2.60b) with R⊲ = 0 for R . This gives us 2R} 2 R 1 Σ

1 R 2 2 1−α R [R1(RR), R2(RR)] = 0, (1 α) log h1 (ˆγ 2 ) . − | | − |h2| h  i Next we consider relay rates for the case (2.63a) where the optimal bidirectional rate pair ⋆ ⋆ ⋆ ⋆ [R1(RΣ), R2(RΣ)] is achievable, i.e. [R1(RΣ), R2(RΣ)] BR(α). This means we con- opt opt †∈ R sider relay rates RR [RR(R1 , R2 ), RR(0, (1 α)R )). This interval may be empty if ∈ − opt the BC sum-rate optimal rate pair is on the R2-axis, i.e. R1 = 0. If the interval in non- empty it follows from (2.63a) that [R (R ), R (R )] = [ 1 R 1−α R†, 1 R + 1−α R†] 1 R 2 R 2 Σ − 2 2 Σ 2 where we get the sum-rate RΣ if we solve (2.60a) for RΣ. This gives us

2 2 |h2| γˆ |h1| γˆ [R1(RR), R2(RR)] = (1 α) log RR , (1 α) log RR . − 2(1−α) − 2(1−α) h  2 +1   2 +1 i

91 2 Bidirectional Relay Communication using Superposition Encoding

⋆ ⋆ For a large signal-to-noise ratio γR we have (1 α)[R−→, R−→] / BR(α) so that − R2 R1 ∈ R [Ropt, Ropt] is on the boundary of α . In some cases we can apply Corollary 2.49 1 2 CMAC to increase the bidirectional sum-rate for a certain range of relay rate until the MAC sum- rate constraint restricts the interchange of relay rate with bidirectional rate. According to Corollary 2.49 an interchange is possible with one bidirectional rate only. For the following ⋆ case study we again distinguish between the cases where RBC(RΣ) intersects the boundary of α . CMAC ⋆ For the case (2.63c), where RBC(RΣ) intersects the boundary of BR(α) at the rate pair opt opt R [R , R ]=[0, αR−→], we have αR−→ < (1 α)R†. By the way if this holds, the previous 1 2 2R 2R − considered case does not occur, i.e. [R⋆(R ), R⋆(R )] / (α) for all R . In this case 1 Σ 2 Σ ∈ RBR Σ we are looking for relay rates which are achievable with bidirectional rate pairs [R , αR−→] 1 2R ∈ (α) where the total sum-rate remains constant according to the interchange property of RBR Corollary 2.49. The largest relay rate is achieved at R1 = 0 and the smallest relay rate is either 0 or it is attained at the vertex αν . This means that we consider relay rates R 2Σ R ∈ [max 0, R (0, αR−→) αR2Σ , R (0, αR−→)). Then the corresponding bidirectional rate { R 2R − 1 } R 2R pair with the largest bidirectional sum-rate for those relay rates RR is given by

[R (R ), R (R )]=[R (0, αR−→) R , αR−→]. 1 R 2 R R 2R − R 2R If we have −→ 2Σ, the interchange of relay rate and bidirectional rate is RR(0, αR2R) > αR1 limited by the sum-rate constraint of the MAC phase. Therefore, for smaller relay rates R < R (0, αR−→) αR2Σ at most a maximal bidirectional sum-rate αRMAC is achievable, R R 2R − 1 Σ e.g. by the vertex αν2Σ.

Next we consider the case −→ † so that the function R⋆ given by αR2R (1 α)R BC(RΣ) ≥ − opt opt (2.63a) intersects the boundary of (α) at the rate pair [R , R ]=[αR−→ (1 RBR 1 2 2R − − † −→ . In this case we look for non-negative relay rates which are achievable with α)R , αR2R] opt opt bidirectional rate pairs given by [R1 , R2 ] and the vertex αν2Σ where the total sum-rate remains constant according to the interchange property of Corollary 2.49. This means that we consider relay rates R [max 0, R (Ropt, Ropt) (αR2Σ Ropt) , R (Ropt, Ropt)). R ∈ { R 1 2 − 1 − 1 } R 1 2 Then the corresponding bidirectional rate pair with the largest bidirectional sum-rate for those relay rates RR is given by [R (R ), R (R )]=[Ropt + (R (Ropt, Ropt) R ), Ropt]. 1 R 2 R 1 R 1 2 − R 2 opt opt 2Σ opt If we have RR(R1 , R2 ) > αR1 R1 , the interchange of relay rate and bidirectional rate is again limited by the sum-rate constraint− of the MAC phase. It similarly follows that for opt opt 2Σ opt smaller relay rates RR < RR(R1 , R2 ) (αR1 R1 ) at most a maximal bidirectional MAC − − sum-rate αRΣ is achievable, e.g. by the vertex αν2Σ. ⋆ Similar arguments apply for the case where the function RBC(RΣ) given by (2.63a) inter- opt opt sects the boundary of (α) at a rate pair [R , R ]=[αR−→, αR−→ + (1 α)R†]. In RBR 1 2 1R 1R −

92 2.5 Piggyback a Common Relay Message this case we look for non-negative relay rates which are achievable with bidirectional rate opt opt pairs [R1 , R2 ] and the vertex ανΣ1 where the total sum-rate remains constant accord- ing to the interchange property of Corollary 2.49. This means that we consider relay rates R [max 0, R (Ropt, Ropt) (αRΣ1 Ropt) , R (Ropt, Ropt)). Then the correspond- R ∈ { R 1 2 − 2 − 2 } R 1 2 ing bidirectional rate pair with the largest bidirectional sum-rate for those relay rates RR is given by [R (R ), R (R )]=[Ropt, Ropt + (R (Ropt, Ropt) R )]. 1 R 2 R 1 2 R 1 2 − R opt opt Σ1 opt If we have RR(R1 , R2 ) > αR2 R2 , the interchange of relay rate and bidirectional rate is again limited by the sum-rate constraint− of the MAC phase. It similarly follows that for opt opt Σ1 opt smaller relay rates RR < RR(R1 , R2 ) (αR2 R2 ) at most a maximal bidirectional MAC − − sum-rate αRΣ is achievable, e.g. by the vertex ανΣ1. ⋆ Finally, if RBC(RΣ) intersects the boundary of BR(α) defined by the MAC sum-rate con- opt opt ⋆ MAC R ⋆ MAC straint, i.e. we have [R1 , R2 ]=[R1(RΣ ), R2(RΣ )], there is no interchange of re- opt opt lay rate and bidirectional rate possible. It follows that for relay rates RR < RR(R1 , R2 ) MAC bidirectional rate pairs with a sum-rate at most αRΣ are achievable, e.g. by the rate pair ⋆ MAC ⋆ MAC [R1(RΣ ), R2(RΣ )].

Total Sum-Rate Maximum Discussion

Theorem 2.48 characterizes for any time division parameter α [0, 1] the rate-pair where ∈ the total sum-rate maximum is attained. We are now interested how the total sum-rate max- imum depends on the time division parameter α. For that goal, in this subsection we need to extend the notation of some symbols by an additional argument to specify the time divi- ⋆ sion. Accordingly, let the function RBC(RΣ, α) denote the sum-rate optimal rate pair of a RΣ broadcast region (1 α) BC( 1−α ) with sum-rate equal RΣ according to Proposition 2.47. ∗ − R opt opt Similarly, let Rtot(α) and [R1 (α), R2 (α)] denote the total sum-rate maximum and the corresponding rate pair where the maximum is attained for a time division parameter α ac- cording to Theorem 2.48. Since the discussion of the total sum-rate with respect to the time division parameter α leads again to a case study, we restrict our discussion without loss of generality to the case where we have h 2 h 2. | 1| ≥| 2| First we distinguish between the cases β⋆ < 0 and β⋆ 0 according to Proposition ⋆ ⋆ ⋆ ≥ 2.2. If β < 0 we always have [R−→, R−→] = [0, R−→(1)] from which it follows that R2 R1 R1 ⋆ the function RBC(RΣ, α) always intersects the boundary of BR(α) on the R2-axis, i.e. opt opt R [R (α), R (α)] = [0, min αR−→, (1 α)R−→(1) ]. This means that it is always sum- 1 2 { 2R − R1 } rate optimal to have a relay communication only in one direction. If we have a time di- R−→(1) vision parameter α α := R1 , we have αR−→ (1 α)R−→(1) which 0 R−→+R−→(1) 2R R1 ≥ 2R R1 ≥ − means that the total sum-rate maximum achieving rate pair is on the boundary of the BC

93 2 Bidirectional Relay Communication using Superposition Encoding

rate region (1 α) BC. This is equivalent to the fact that the broadcast sum-rate op- − R ⋆ ⋆ timal rate pair (1 α)[R−→, R−→] is within α MAC. Accordingly, if α < α0 we have R2 R1 ⋆ ⋆ − C (1 α)[R−→, R−→] / α MAC so that the total sum-rate optimal rate pair is given by R2 R1 opt− opt ∈ C −→ . [R1 (α), R2 (α)] = [0, αR2R] ⋆ ⋆ ⋆ ⋆ ⋆ On the other hand, if β 0 holds, we have [R−→, R−→]=[R−→(β ), R−→(1 β )] so ≥ R2 R1 R2 R1 − that it is sum-rate optimal to communicate in both directions. With an increasing time di- vision parameter α [0, 1] we enlarge the MAC rate region α and reduce the BC ∈ CMAC rate region (1 α) . Accordingly, for some α the broadcast sum-rate optimal rate − RBC pair (1 α)[R−→(β⋆), R−→(1 β⋆)] is within α . As before, we denote the cor- − R2 R1 − CMAC responding time division parameter by α0. For the explicit characterization we need to distinguish between the boundary sections of α where we find a rate pair which is CMAC equal to the sum-rate optimal rate pair of (1 α) . For α [0, 1] the rate pairs − RBC ∈ (1 α)[R−→(β⋆), R−→(1 β⋆)] specify a line from the origin in the first quadrant with − R2 R1 − an angle −→ ⋆ 1 2 RR1(1 β ) log( 2 γˆ h1 ) φBC := arctan − = arctan | | . (2.69a) R−→(β⋆) log( 1 γˆ h 2) R2 2 | 2| Accordingly, for α [0, 1] the vertices αν = [αR−→, α(RMAC R−→)] and αν = ∈ Σ1 1R Σ − 1R 2Σ [α(RMAC R−→), αR−→] specify lines from the origin in the first quadrant with angles Σ − 2R 2R MAC −→ RΣ R1R φΣ1 : = arctan − , (2.69b) −→ R1R −→ R2R φ2Σ : = arctan (2.69c) RMAC R−→ Σ − 2R respectively. The growing MAC rate regions α and shrinking BC rate regions (1 CMAC − α) with increasing α and the corresponding lines of the vertices and broadcast sum-rate RBC optimal rate pairs are illustrated in Figure 2.15. Since the angles φΣ1, φ2Σ, and φBC do not depend on the time division parameter, we can use the angles to identify the section of the MAC boundary where we find the broadcast sum-rate optimal rate pair for α0.

Thus, if we have φBC φ2Σ there exists a time division parameter α0 where the sum-rate ≥ ⋆ ⋆ optimal rate pair (1 α0)[R−→, R−→] of the BC rate region (1 α0) BC is on the section − R2 R1 − R of the boundary of which is characterized by the individual rate constraint −→, i.e. α0 MAC R2R ⋆ ⋆ C 2 MAC (1 α0)[R−→, R−→] α0[R1, R−→] Ê : 0 R1 R R−→ . Accordingly, if R2 R1 2R + Σ 2R − ∈ { ∈ ≤ ≤ − } ⋆ R−→ ⋆ R1 we solve (1 α )R−→ = α R−→ for α we get the time division parameter α = ⋆ 0 0 2R 0 0 R−→+R−→ − R1 R1 2R for the case φ φ . BC ≥ 2Σ Similarly, if we have φBC φΣ1 there exists a time division parameter α0 where the sum- ≤ ⋆ ⋆ rate optimal rate pair (1 α0)[R−→, R−→] is on the section of the boundary of α MAC which is − R2 R1 C

94 2.5 Piggyback a Common Relay Message

α =1 2 1.5 |h | =1 1.5 1 |h |2 =1 |h |2 =0.7 1 2 |h |2 =0.7 α =0.8 γ =1 2 1.2 1 1.2 γ =1.7 γ =2.5 R 2 0.9 α =0.6 0.9 α =0 [bit/channel use] [bit/channel use] 2 2 α =0.4 α =0.2 0.6 0.6 rate R rate R α =0.4 α =0.2 0.3 0.3 α =0.6 φ φ BC φ Σ1 2Σ α =0.8 0.3 0.6 0.9 1.2 1.5 0.3 0.6 0.9 1.2 1.5 rate R [bit/channel use] rate R [bit/channel use] 1 1

Figure 2.15: The left and right figures show the increasing MAC rate regions α and CMAC decreasing BC rate regions (1 α) BC for increasing α. Furthermore, we de- picted the lines characterized by− theR vertices and the broadcast sum-rate optimal ⋆ rate pairs. In the right figure the function RBC(RΣ, α) for α = 0, 0.2, 0.4, 0.6, and 0.8 (dashed lines) are additionally depicted.

⋆ characterized by the individual rate constraint R−→. Accordingly, if we solve (1 α0)R−→ = 1R R2 ⋆ − R−→ R2 α R−→ for α we get α = ⋆ for the case φ φ . 0 1R 0 0 R−→+R−→ BC Σ1 R2 1R ≤

Finally, if we have φ2Σ > φBC > φΣ1 there exists a time division parameter α0 where the sum-rate optimal rate pair of (1 α ) is also sum-rate optimal with respect to the − 0 RBC MAC rate region α0 MAC, i.e. the rate pair is on the section of the boundary of α0 MAC C MAC C which is characterized by the sum-rate constraint RΣ . Accordingly, if we solve (1 RBC − α )(R⋆ + R⋆ ) = (1 α )RBC = α RMAC for α we get α = Σ for the case 0 −→ −→ 0 Σ 0 Σ 0 0 RBC+RMAC R2 R1 − Σ Σ φ2Σ > φBC > φΣ1.

In the next proposition we summarize the previous considerations and characterize the total π sum-rate optimal rate pair according to Theorem 2.48. Since φBC is greater than 2 for ⋆ ⋆ ⋆ β < 0, we can merge the case β < 0 with the case β 0 and φBC > φ2Σ according to ⋆ ⋆ ≥ the definition of [R−→, R−→] in Proposition 2.2. R2 R1

⋆ ⋆ Proposition 2.50. The sum-rate optimal rate pair (1 α)[R−→, R−→] of the broadcast region − R2 R1 (1 α) is within the scaled MAC rate region α and therefore within (α) if − RBC CMAC RBR

95 2 Bidirectional Relay Communication using Superposition Encoding we have a time division parameter α := [α , 1] with ∈ABC 0 ⋆ R−→ R1 ⋆ , if φ φ , R−→+R−→ BC 2Σ R1 2R ≥  RBC α := Σ , if φ > φ > φ , (2.70) 0  RBC+RMAC 2Σ BC Σ1  Σ ⋆ Σ  R−→  R2 ⋆ , if φ φ . R−→+R−→ Σ1 BC R2 1R ≥   Then the BC sum-rate optimal pair is also sum-rate optimal with respect to the total sum-rate R∗ (α). This means for α α that we have tot ≥ 0 opt opt ⋆ ⋆ [R (α), R (α)] = (1 α)[R−→, R−→] (2.71) 1 2 − R2 R1

∗ BC ⋆ ⋆ with total sum-rate R (α) = (1 α)R = (1 α)(R−→ + R−→). tot − Σ − R1 R2

The total sum-rate R∗ (α) follows from the fact that for α α the total sum-rate optimal tot ≥ 0 rate pair is equal to the sum-rate optimal rate pair of (1 α) so that β and therefore − RBC R the additional relay rate RR are equal to zero.

The set BC = [α0, 1] denotes the set of time division parameters α where the sum-rate A ⋆ ⋆ optimal rate pair of the BC phase (1 α)[R−→, R−→] is achievable in the MAC phase. Ac- R2 R1 − ⋆ ⋆ cordingly, for α 0 := [0, α0) the rate pair (1 α)[R−→, R−→] is not achievable in the ∈ A − R1 R2 MAC phase. Then it follows from Theorem 2.48 that the total sum-rate optimal rate pair is attained at the rate pair where R⋆ (R , α) intersects the boundary of (α). As in BC Σ RBR Section 2.5.3 we can distinguish between four possible intersections for h 2 h 2. For | 1| ≥ | 2| the following characterization of the cases we first ignore the feasibility of the time division parameters. In the proposition after it we take the feasibility into account.

† 1. For small time division parameters α < α := R the function R⋆ (R , α) 1 R†+R−→ BC Σ 2R intersects the boundary of α on the R -axis, this means at the rate pair [0, αR−→]. CMAC 2 2R Accordingly, characterizes the time division parameter where we have −→ α1 α1R2R = (1 α )R†. − 1 † 2. For time division parameters α α < α := R the function 1 2 2R−→−RMAC+R† ≤ 2R Σ R⋆ (R , α) intersects the boundary of α characterized by the individual rate BC Σ CMAC constraint −→, this means at a rate pair in −→ −→ 2Σ . αR2R α 2R = α[R1, R2R] : 0 R1 < R1 R { ⋆ ≤ } Thereby, α2 characterizes the time division parameter where RBC(RΣ, α) intersects the boundary of α in its vertex αν . Accordingly, we get α if we solve CMAC 2Σ 2 R⋆(α RMAC)= α2 RMAC 1−α2 R† = α (RMAC R−→) for α . 1 2 Σ 2 Σ − 2 2 Σ − 2R 2

96 2.5 Piggyback a Common Relay Message

† 3. For time division parameters α α α := R the function 2 3 RMAC−2R−→+R† ≤ ≤ Σ 1R R⋆ (R , α) intersects the boundary of α characterized by the sum-rate con- BC Σ CMAC straint αRMAC, this means at a rate pair in α MAC = α[R , RMAC R ] : Σ RΣ { 1 Σ − 1 R2Σ R R−→ . Thereby, α characterizes the time division parameter where 1 ≤ 1 ≤ 1R} 3 R⋆ (R , α) intersects the boundary of α in its vertex αν . Accordingly, we BC Σ CMAC Σ1 get α if we solve R⋆(α RMAC)= α3 RMAC 1−α3 R† = α R−→ for α . 3 1 3 Σ 2 Σ − 2 3 1R 3 ⋆ 4. Finally, for large time division parameters α > α3 the function RBC(RΣ, α) intersects the boundary of α characterized by the individual rate constraint αR−→, this CMAC 1R means at a rate pair in α −→ = α[R−→, R ] : 0 R < RΣ1 . R1R { 1R 2 ≤ 2 2 } Since for h 2 h 2 we have R† 0. Then the parameters α or α are negative if we | 1| ≥ | 2| ≥ 2 3 have R−→ + R† < R2Σ or RΣ1 < R−→ R† respectively. Such time division parameters are 2R 1 2 1R − obviously not feasible. The feasible time division parameters are given by the set 0. Then in the following proposition we show that the feasible cases are again specified by theA angles φBC, φΣ1, and φ2Σ. Proposition 2.51. With := [0, α ) let := [0, α ) , := [α , α ) , A0 0 A1 1 ∩ A0 A2 1 2 ∩ A0 3 := [α2, α3) 0, and 4 := 0 1 2 3 denote the sets of feasible time divisionA parameters∩A of the previousA cases.A \ ThenA ∪A we have∪A  = , , , = , if φ > π , A1 6 ∅ A2 A3 A4 ∅ BC 2 , = , , = , if π φ > φ , A1 A2 6 ∅ A3 A4 ∅ 2 ≥ BC 2Σ , , = , = , if φ φ > φ , A1 A2 A3 6 ∅ A4 ∅ 2Σ ≥ BC Σ1 , , , = , if φ φ . A1 A2 A3 A4 6 ∅ Σ1 ≥ BC

For a time division parameter α 0 the total sum-rate optimal rate pair opt opt ∈ A [R (α), R (α)] on the boundary of the scaled MAC region α is given by 1 2 CMAC [0, αR−→], if α , 2R ∈A1 −→ † −→ if opt opt [αR2R (1 α)R , αR2R], α 2, [R1 (α), R2 (α)] =  α MAC− 1−−α † α MAC 1−α † ∈A [ R R , R + R ], if α 3,  2 Σ − 2 2 Σ 2 ∈A −→ −→ † if [αR1R, αR2R + (1 α)R ], α 4,  − ∈A  so that we have the total sum-rate maximum

α α |h |2 R−→ R−→ 2 1−α 2R 2 1−α 2R (1 α) log 2 2 γˆ h1 2 , if α 1 2, − |h1| | | − ∈A ∪A α RMAC α RMAC ∗   2(1−α) Σ 2(1−α) Σ Rtot(α)= (1 α) log 2 h1h2 γˆ 2  , if α 3,  − α | | − α ∈A  |h |2 R−→ R−→   1 1−α 1R 2 1−α 1R  (1 α) log 2 2 γˆ h2 2 ,  if α 4. − |h2| | | − ∈A    

97 2 Bidirectional Relay Communication using Superposition Encoding

|h |2 =1 |h |2 =1 1 1 |h |2 =0.5 |h |2 =0.7 0.3 2 2 γ =1 γ =2 1 1 γ =1.5 γ =1.8 2 2 γ =0.3 γ =0.7 R 0.3 R [bit/channel use] [bit/channel use] 2 2 rate R rate R

0.3 0.3 rate R [bit/channel use] rate R [bit/channel use] 1 1

|h |2 =1 |h |2 =1 1 1 |h |2 =0.7 |h |2 =0.8 2 2 γ =1.3 γ =0.7 0.6 1 0.6 1 γ =2 γ =2.5 2 2 γ =2.5 γ =3.5 R R [bit/channel use] [bit/channel use] 2 2

0.3 0.3 rate R rate R

0.3 0.6 0.3 0.6 rate R [bit/channel use] rate R [bit/channel use] 1 1

Figure 2.16: The figures show parametrized curves of the total sum-rate optimal rate pairs [Ropt(α), Ropt(α)] for α [0, 1] according to the four different cases for 1 2 ∈ h 2 h 2. For the upper left figure we have φ > π , for the up- | 1| ≥ | 2| BC 2 per right figure we have π φ > φ , for the lower left figure we have 2 ≥ BC 2Σ φ φ > φ , and for the lower right figure we have φ φ . Fur- 2Σ ≥ BC Σ1 Σ1 ≥ BC thermore, we depicted in parts α , α , and R⋆ (R , α) for α = 0.2 CMAC RBC BC Σ (solid), α = 0.4 (dashed-dotted), α = 0.6 (dashed), and α = 0.8 (dotted) with gray lines. Additionally, we marked some characteristic optimal rate pairs specified by (£ : α = 0.2), (¡ : α = 0.4), (△: α = 0.6), (▽ : α = 0.8), ( : ◦ α = α0), (: α = α1), (♦ : α = α2), and ($: α = α3).

98 2.5 Piggyback a Common Relay Message

Proof. The proof can be found in Appendix 2.8.33.

opt opt The parametrized curves in Figure 2.16 illustrate the optimal rate pairs [R1 (α), R2 (α)] 2 2 for time division parameters α [0, 1] for the four possible cases for h1 h2 . For comparison between the cases the∈ optimal rate pairs and in parts the broadca| | st≥ and | multiple| access rate regions for time division parameters α = 0.2, 0.4, 0.6, and 0.8 are depicted. Furthermore, the optimal rate pairs of the characteristic time division parameters α0, α1, α2, and are marked. In more detail, in the upper left we have the case where † −→ so α3 R > R2R that we have BC 1 = [0, 1]. It follows that we have only two sections. For α α0 we opt A opt∪A ≥ have −→ according to Proposition 2.50 and [R1 (α), R2 (α)] = [0, (1 α)RR1(1)] BR(α) opt −opt ∈ R for α < α we have [R (α), R (α)] = [0, αR−→] (α) according to Proposition 0 1 2 2R ∈ RBR 2.51. In the upper right, we have 2 = so that we additionally have the case α1 α < α0 A 6 ∅ opt opt ≤ where the optimal rate pair is given by −→ † −→ [R1 (α), R2 (α)] = [αR2R (1 α)R , αR2R] according to Proposition 2.51. Similarly in the lower left and lower right− we firs− t additionally have = and then = as well. A3 6 ∅ A4 6 ∅ The Propositions 2.50 and 2.51 characterize for each time division parameter the correspond- ∗ opt opt ing total sum-rate Rtot(α). Since the parametrized curves [R1 (α), R2 (α)] are continuous for each case, the section-wise defined function R∗ (α) is continuous as well. For α tot ∈ABC we know from Proposition 2.50 that with increasing α the total sum-rate Rtot(α) decreases linearly. This means that for this section the total sum-rate is always maximized at α0. But for time division parameters α a closed form discussion of the total sum-rate is no ∈ A0 longer possible, c.f. Remark 2.4. Moreover, from numerical examples there is unfortunately no clear behavior observable. In Figure 2.17 we depicted some representative numerical ex- amples which should give some idea how the total sum-rate behaves with respect to the time division parameter α. In the upper left we see that the total sum-rate maximum is attained at α0. In the upper right the total sum-rate is attained at some α within the interval (0, α0) and in the lower left and right it is optimal with respect to the total sum-rate to have a relay multicast only.

From Theorem 2.48 we know that for a given time division parameter α the total sum-rate is maximized at the bidirectional rate pair R⋆ (R , α) (α) of the largest possible bidi- BC Σ ∈ RBR rectional sum-rate RΣ. This means that we first allocate relay power to support an efficient bidirectional rate pair then the remaining transmit power can be used for the additional relay communication. But since we a priori fixed the time division parameter we do not factor in the costs of transmitting the messages to the relay node in the previous MAC phase. In the lower left and right figure, we see that the resource costs (large fraction of time) of the MAC phase are higher than the spectral efficiency of the bidirectional broadcast phase so that it is total sum-rate optimal to have no bidirectional communication. However, since it was the aim to have two routing tasks, it is questionable if such a solution is desired. Neverthe- less, it shows that for a spectrally efficient bidirectional relaying we need enough resources

99 2 Bidirectional Relay Communication using Superposition Encoding

(transmit power at nodes 1 and 2) in the MAC phase as well.

Comparison with a TDMA protocol

To demonstrate the efficiency of the proposed protocol we compare the achievable rate re- gions of the piggyback on bidirectional relaying protocol with equal time division with a straightforward Round Robin TDMA approach. Thereby, we assume a TDMA protocol with five time slots of equal duration. For a fair comparison, we adapt the power constraints in the TDMA protocol so that both protocols consume the same amount of energy. Accordingly, 5 in the first time slot node 1 transmits its message to the relay node with transmit power 2 P1. Similarly, in the second time slot node 2 transmits its message to the relay node with transmit 5 power 2 P2. In the third and fourth time slot the relay node separately forwards the messages 5 with power 6 PR. With the same power the relay message is transmitted to nodes 1 and 2 in the last time slot. This give us the achievable rates for a comparable TDMA protocol

RTDMA = 1 log 1 + min 5 γ h 2, 5 γ h 2 , 1 5 { 2 1| 1| 6 R| 2| } RTDMA = 1 log 1 + min 5 γ h 2, 5 γ h 2 , 2 5 { 2 2| 2| 6 R| 1| } RTDMA = 1 log 1+ 5 γ min h 2, h 2 . R 5 6 R {| 1| | 2| }   Figure 2.18 illustrates for two scenarios the dominance of the bidirectional relaying protocol with an additional relay multicast for the equal time division case. For both cases we see that the achievable rate region (1/2) is significantly larger in any direction than the achiev- RPiggy able rate region of the TDMA protocol (cuboid), which means that the entire achievable rate region of the TDMA protocol (cuboid) is within the piggyback rate region. Accordingly, the piggyback approach achieves higher weighted total sum-rates, which is important for service adapted network operations. Moreover, it illustrates that the joint resource allocation allows new advantageous rate trade-offs so that we conclude that the synergy from the joint resource allocation of two routing tasks, multicast and bidirectional relaying, improves the performance significantly.

Finally, for completeness we present the achievable rate regions of bidirectional relaying with an additional relay multicast and optimal time division opt of two representative RPiggy examples in Figure 2.19. Since the optimal decoding order holds for any fixed time division parameter, it is also optimal to decode the relay message first for the optimal time division. Unfortunately, a closed form discussion as for the fixed time division case is not possible, cf. Remark 2.4, but we can use the equivalent characterization of the bidirectional achievable rate region according to Theorem 2.12 to illustrate the rate region opt . RBRopt RPiggy

100 2.5 Piggyback a Common Relay Message

0.4 |h |2 =1 |h |2 =1 1 1 |h |2 =0.5 |h |2 =0.7 2 0.6 2 γ =1 γ =2 0.3 1 1 γ =1.5 0.5 γ =1.8 2 2 γ =0.3 γ =0.7 R R

[bit/channel use] [bit/channel use] 0.4

tot 0.2 tot 0.3

rate R rate R 0.2 0.1 0.1

0 0 0 α 0 1 0 α 1 α 0 1 α α

2 |h |2 =1 |h |2 =1 1 1 |h |2 =0.7 |h |2 =0.8 2 2 2 γ =1.3 γ =0.7 1.5 1 1 γ =2 γ =2.5 2 2 γ =2.5 1.5 γ =3.5 R R [bit/channel use] [bit/channel use]

tot 1 tot 1 rate R rate R 0.5 0.5

0 0 0 α 1 α 2 α 0 1 0 α 1α 2 α 3 α 0 1 α α

∗ Figure 2.17: The figures show the total sum-rate maximum Rtot(α) with respect to the time division parameter α [0, 1] for the four cases for h 2 h 2. For the ∈ | 1| ≥ | 2| upper left figure we have φ > π , for the upper right figure we have π BC 2 2 ≥ φ > φ , for the lower left figure we have φ φ > φ , and for BC 2Σ 2Σ ≥ BC Σ1 the lower right figure we have φΣ1 φBC. ( ) specifies the maximum for each case. Additionally, we marked the≥ total sum-rates∗ of some characteristic time division parameters ( : α = α ), (: α = α ), (♦ : α = α ), and ($: ◦ 0 1 2 α = α3).

101 2 Bidirectional Relay Communication using Superposition Encoding

γ =0.8 γ =1 1 1 γ =1.2 γ =0.9 2 2 γ =1.3 γ =1.3 R R 0.6 |h |2 =1 0.5 |h |2 =1 1 1 0.5 |h |2 =0.8 |h |2 =0.7 2 0.4 2 0.4 0.3

R 0.3 R R R 0.2 0.2 0.1 0.1 0 0 0 0 0.2 0.2 0 0 0.2 0.4 0.2 0.4 0.4 0.4 0.6 R 0.6 R R 0.6 1 R 0.6 1 2 2

Figure 2.18: Comparison of achievable rate region Piggy(1/2) of piggyback a common relay message on bidirectional relaying withR equal time division and a TDMA proto- col realizing the same routing task (cuboid) with the same energy consumption. In the left figure we have at the bullet ( ) a unique total sum-rate optimum; in • the right figure we can interchange rate R1 with RR along the bold line between the the bullets without loosing total sum-rate optimality. On the contour lines for equal additional relay rates the bidirectional sum-rate optimum is marked by a cross ( ). ×

γ =0.8 γ =1 1 1 γ =1.2 γ =0.9 2 2 γ =1.3 γ =1.3 R R |h |2 =1 |h |2 =1 1 1 1 1 |h |2 =0.8 |h |2 =0.7 2 2 0.8 0.8

R 0.6 R 0.6 R R 0.4 0.4 0.2 0.2 0 0 0 0 0.2 0.2 0 0 0.2 0.4 0.2 0.4 0.4 0.4 0.6 R 0.6 R R 0.6 1 R 0.6 1 2 2

opt Figure 2.19: Achievable rate region Piggy of piggyback a common message on bidirec- tional relaying with optimalR time division with the same system parameters as in Figure 2.18. The contour lines denote achievable rate pairs for fixed 1 2 βR = 15 , 15 ,..., 1. The contrasting colors characterize the three sections ac- cording to Therorem 2.12.

102 2.6 Extension to Multi-Antenna Bidirectional Relaying

2.6 Extension to Multi-Antenna Bidirectional Relaying

In this section we extend the bidirectional relaying protocol with superposition encoding to nodes equipped with multiple antennas. The leads to a multiple-input multiple-output (MIMO) wireless system as depicted in Figure 2.20. The Gaussian vector channel was stud- ied first by Tsybakov in [Tsy65] in 1965. The work of Teletar, Foschini and Gans have shown in [Tel99] and [FG98] that multiple-antenna systems have the ability to reach higher trans- mission rates than single-antenna systems. The basic idea is to exploit the spatial dimension offered by the MIMO channel. With an appropriate processing at the transmitter and receiver we obtain multiple subchannels, also called the channel eigenmodes, which allow data mul- tiplexing on several substreams and lead therefore to a linear increase in capacity. On the other hand the spatial degrees of freedom can be utilized to transmit the data signal over multiple fading paths to increase the robustness of the transmission through diversity. Both works have sparked an active and flourishing research area. For a comprehensive discussion on recent results on MIMO wireless communications with large reference lists we refer to the book [BCC+07] and the overview paper [GJJV03].

In [WZHM05] Wang, Zhang, and Host-Madsen can calculate upper and lower bounds for the Gaussian MIMO relay channel with a full-duplex relay node by simplifying the opti- mization over the joint distribution of the source and relay node input. Then they present sufficient conditions when the upper and lower bound on the ergodic capacity meet in the case of Rayleigh fading. But the spatial MIMO gains can be also obtained using multiple relay nodes. Wittneben and Rankov propose in [WR03] the relay assisted MIMO link where amplify-and-forward relays ensure the rich scattering requirement of MIMO systems. In [BNOP06] Bölcskei, Nabar, Oyman, and Paulraj derive scaling laws of the network capacity with different processing strategies at the relay nodes depending on its channel state infor- mation. The source and destination are equipped with M antennas so that the capacity scales linearly with M/2 in the limit of the number of half-duplex relay nodes. Moreover, there are some other interesting works which address other important MIMO relaying aspects like coverage extension in cellular networks [HKW06], linear processing for a multiuser MIMO system [TCHC06], etc.

T T H1 H2 H1 H2

N1 NR N2 N1 NR N2 1 R 2 1 R 2

(a) MAC phase (b) BC phase

Figure 2.20: A three-node network, where the relay node, node 1, and node 2 are equipped with NR, N1, and N2 antennas respectively.

103 2 Bidirectional Relay Communication using Superposition Encoding

As before, we consider a two-phase bidirectional decode-and-forward relaying protocol without feedback. In the multiple access phase the nodes 1 and 2 transmit their messages with rate R1 and R2 to the relay node. We assume that the relay node decodes both messages successfully if the rates are within the capacity region of the MAC phase. In the succeeding broadcast phase the relay separately re-encodes the messages and transmits the superposi- tion of the codewords. In [OB07c] we have studied the achievable rate region of such a multi-antenna bidirectional relaying protocol. Recently, in [HKE+07] Hammerström et. al. compare the sum-rate performance of superposition encoding and XOR precoding at the re- lay node based on the concept of [WCK05] and [LJS05]. Since the XOR coding approach is more power efficient, it leads to a better performance. We expect another improvement if one uses the coding idea of Chapter 3 for the Gaussian MIMO bidirectional relay channel.

The MIMO system model is similar to the SISO case considered in Section 2.1. However, in this section we require perfect channel knowledge available at each node. As before, we assume a perfectly synchronized three-node network as depicted in Figure 2.20. The relay node, nodes 1 and 2 are equipped with NR, N1, and N2 antennas respectively. Let

NR×N1 NR×N2 C H C and H characterize the discrete-time time-invariant multi- 1 ∈ 2 ∈ plicative MIMO channels between the relay node and nodes 1 and 2 respectively. For sim- plicity we assume reciprocal channels. The rank r = rank(H ) min N ,N and 1 1 ≤ { 1 R} r2 = rank(H2) min NR,N2 denote the number of spatial degree of the channels, i.e. each non-zero≤ eigenmode{ of the} channel can support a data stream. The mean transmit powers of each node are restricted by power constraints Pk, k 1, 2, R , respectively. Furthermore, the reception at each antenna of every node is distorted∈ { by independent} addi- 2 −1 tive white Gaussian noise n1, n2, and nR with equal covariance matrices σ I = ρ I. A generalization to individual and more general noise covariance matrices is straightforward. Then after symbol-rate sampling the system equation in the MAC phase for time instants m is given by

yR[m]= H1x1[m]+ H2x2[m]+ nR[m],

NR N1 C where yR[m] C denotes the received signal vector at the relay node, x1[m]

∈N2 ∈ NR C and x [m] C denote the transmit signal vector of nodes 1 and 2, and n [m] 2 ∈ R ∈ denotes the additive noise vector. Similarly, after symbol-rate sampling the system equation in the BC phase for time instants m is given by

T yk[m]= Hk xR[m]+ nk[m], k = 1, 2,

Nk NR C where yk[m] C denotes the received signal vector at node k, k = 1, 2, xR[m] ∈ Nk ∈ denotes the transmit signal vector of the relay node, and n [m] C denotes the additive k ∈ noise vector at node k, k = 1, 2.

In the following we first briefly review the optimal transmit strategies of the Gaussian MIMO channel with CSI at the transmitter and receiver. In the next sections we summarize the

104 2.6 Extension to Multi-Antenna Bidirectional Relaying known capacity results on the Gaussian MIMO multiple access channel and present the opti- mal transmit strategy for the Gaussian MIMO channels in the BC phase using superposition encoding. Due to the complicated structure of the rate regions in the MIMO case the com- binatoric cannot be given in closed form. Nevertheless, with the results presented here it is possible to characterize the optimal transmit strategies for any rate pair using standard methods of convex optimization. Furthermore, we will see that the achievable rate in the high power regime scales linearly with the minimum of the fraction of time weighted spatial degree of both MIMO channels.

MIMO Gaussian Channel

We first look at a Nt Nr multiple-input multiple-output (MIMO) wireless point-to-point connection where we× consider a linear time-invariant multiplicative channel with additive white Gaussian noise. We assume that the transmitter and receiver have perfect channel knowledge for encoding and decoding. In the following, we briefly reproduce the deriva- tion of the information capacity of the MIMO Gaussian channel as done in [Tel99, TV05]. Therefore, the vector-valued linear input-output relation can be expressed as follows

Y = HX + N

Nr×Nt Nt×1 C where H C denotes the channel matrix and the random vectors X , Nr×∈1 2 ∈ Y C , and N (0,σ I ) denote the input, the output, and the complex Gaus- ∈ ∼ CN Nr sian noise of the channel respectively. As in the scalar case we assume that the noise is independent of the input. Furthermore, we require that the input has to fulfill a mean trans- H mit power constraint E X X P . { }≤ Similar to the scalar case we can define the mutual information for the vector-valued channel as follows I(X; Y ) := h(Y ) h(Y X)= h(Y ) h(N) − | − where h(Y ) and h(Y X) denote the differential entropy and conditional differential en- | tropy. The differential entropy for a continuous random vector Y defined on the support Y S with density fY (y) is defined as

h(Y ) := fY (y) log fY (y)dy. − ZSY

The conditional differential entropy for continuous random vectors (Y , X) defined on Y S × X with joint and conditional densities fY X (y, x) and f (x y) is defined as S , Y |X |

h(Y X) := fY X (y, x) log f (y x)d(y, x). | − , Y |X | ZSY ×SX

105 2 Bidirectional Relay Communication using Superposition Encoding

Then Lemma 2 in [Tel99] shows that a circularly symmetric complex Gaussian14 distribu- tion X (0, Q) maximizes the differential entropy with h(X) = log det(π e Q) of ∼ CN complex random vectors with zero mean and covariance matrix Q. Since the noise vector N is independent of the the input vector X we have

H H H H H 2

E E E YY = H XX H + NN = HQH + σ I , { } { } { } Nr H where Q := E XX . It follows that a circularly symmetric complex Gaussian distributed { } input vector X (0, Q) maximizes the entropy h(Y ) as well. ∼ CN The information capacity C is again defined as the maximal mutual information over all input distributions. With a circularly symmetric complex Gaussian input vector X (0, Q) we have ∼ CN

2 C = max I(X; Y ) = max h(Y ) log det(π e INr σ ) fX (x):tr(Q)≤P fX (x):tr(Q)≤P − H 2 2 = max log det π e(HQH + INr σ ) log det(π e INr σ ) tr(Q)≤P − 1 H  = max log det(INr + 2 HQH ). tr(Q)≤P σ Therefore, it remains to find the optimal covariance matrix Q∗ which satisfies the power constraint tr(Q∗) P . ≤ This convex optimization problem of finding the optimal covariance matrix can be explicitly solved using the Lagrangian method [Tel99, BV04]. This leads to the so called water-filling solution. In the following we briefly describe the procedure to calculate the optimal transmit covariance matrix Q∗ according to the water-filling solution. Let H Σ H Σ H H = V V , with := diag(λ1, λ2,...,λNt ) and unitary matrix V be the eigenvalue decomposition of HH H with eigenvalues sorted in decreasing order, i.e. λ λ 0. Then 1 ≥···≥ Nt ≥ ∗ H Q = V diag(ξ1, ξ2,...,ξNt )V with eigenvalues 2 max ν σ , 0 , if λ = 0, λn n ξn := − 6 (0,  if λn = 0, 14The probability density function of a complex valued circularly symmetric (or spherically invariant) Gaussian random vector X ∼ CN (µ, Q) of dimension N with mean µ and covariance matrix Q is given by

H −1 1 −(x−µ) Q (x−µ) fX (x) = e , (2.72) πN det(Q)

T N×N C where additionally E{(X − µ)(X − µ) } = 0 ∈ holds. This circularity condition ensures that uncorrelated jointly Gaussian random variables are also independent[KSH00, App 3.C],[Doo53, Sec. II.3].

106 2.6 Extension to Multi-Antenna Bidirectional Relaying where the so called water-level ν follows from the transmit power constraint

Nt ∗ P = ξn = tr(Q ), n=1 X which is obviously fulfilled with equality for the optimal transmit covariance matrix. For the water-filling procedure we introduce the short notation Q(HH H, P ) so that for the MIMO Gaussian channel the optimal transmit covariance is given by

Q∗ = Q(HH H, P ).

With the optimal transmit covariance matrix Q∗ the information capacity for the MIMO channel is given as follows

N r λ ξ C = log det(I + 1 HQ∗HH )= log 1+ n n . Nr σ2 σ2 n=1 X   It depends on the rank of the channel matrix H and the transmit power constraint how many eigenmodes of the channel are used. In the so called low-power regime beamforming is optimal. This means that only the strongest eigenmode of the channel is used. Furthermore, the case where all eigenmodes of the channel are used is called the high-power regime.

2.6.1 MIMO Multiple Access Phase

In the first phase, nodes 1 and 2 transmit their information for each other to the relay node. The encoding and the decoding are performed as in the classical discrete-time Gaussian MIMO MAC channel. In principle the Gaussian MIMO MAC follows from the classical result from Ahlswede [Ahl71a] and Liao [Lia72], but many researchers have explicitly stud- ied various interesting aspects [CV93, YRBC01, BJ02, VJG03, BW06] to mention only a few. Since we consider memoryless channels, it is sufficient to consider single letters only. Therefore, the vector-valued linear input-output relation can be expressed as follows

Y R = H1X1 + H2X2 + N R

NR where the continuous random vector Y R C denotes the output at the relay node, NR ∈ the continuous random vector Xk C denotes the input from node k, k = 1, 2, and NR ∈ N C denotes the complex additive white Gaussian noise distributed according to R ∈ (0, Iσ2) at the relay node. CN

107 2 Bidirectional Relay Communication using Superposition Encoding

MIMO Again, we assume uncorrelated sources. Then the multiple access capacity region MAC is given by the convex hull of the set of rate pairs which satisfy the following individualC and sum-rate constraints

R I(X ; Y X )= h(Y X ) h(Y X , X )= h(H X + N ) h(N ), 1 ≤ 1 R| 2 R| 2 − R| 1 2 1 1 R − R R I(X ; Y X )= h(Y X ) h(Y X , X )= h(H X + N ) h(N ), 2 ≤ 2 R| 1 R| 1 − R| 1 2 2 2 R − R R + R I(X , X ; Y )= h(Y ) h(Y X , X )= h(Y ) h(N ) 1 2 ≤ 1 2 R R − R| 1 2 R − R for some vector input distributions fX1 (x1) and fX2 (x2) which satisfy the power constraint H E X X P , k = 1, 2. { k k}≤ k Since we assume that the inputs X1, X2 and noise N R are pairwise independent, the co- variance matrix of the output Y R can be expressed as

H H H H H H

E E E E Y Y = H X X H + H X X H + N N { R R } 1 { 1 1 } 1 2 { 2 2 } 2 { R R } :=Q :=Q 2I 1 2 =σ NR | {z } | {z } | {z } with tr(Qk) Pk, k = 1, 2, to fulfill the power constraints. Since a circularly symmet- ≤ 0 H H ric complex Gaussian vector distributed according to ( , H1Q1H1 + H2Q2H2 + 2 CN σ INR ) maximizes the differential entropy of a random vector Y with covariance matrix H H 2 H1Q1H1 + H2Q2H2 + σ INR we have h(H X + N ) log det π e(H Q HH + σ2I ) , 1 1 R ≤ 1 1 1 NR h(H X + N ) log det π e(H Q HH + σ2I ) , 2 2 R ≤ 2 2 2 NR  h(Y ) log det π e(H Q HH + H Q HH + σ2I ) ≤ 1 1 1 2 2  2 NR with equalities if we have circularly symmetric complex Gaussian inputs X  (0, Q ), k ∼ CN k k = 1, 2. It follows that the optimal input for given covariance matrix is distributed ac- cording to zero mean circularly symmetric complex Gaussian distribution. With h(N R) = 2 0 log det π e σ INR and the optimal input distributions Xk ( , Qk), k = 1, 2, the individual and sum-rate constraints can be expressed as ∼ CN  −→ Q I 1 H Q HH (2.73a) R1R( 1) := log det NR + σ2 1 1 1 , −→ Q I 1 H Q HH (2.73b) R2R( 2) := log det NR + σ2 2 2 2 , MAC 1 H 1 H RΣ (Q1, Q2) := log det INR + σ2 H1Q1H1 + σ2 H2Q2H2 . (2.73c)

Accordingly, for covariance matrices Q1 and Q2 we can achieve rate pairs within the re- gion

MIMO 2 MAC (Q , Q ) := [R , R ] Ê : R + R R (Q , Q ), CMAC 1 2 1 2 ∈ + 1 2 ≤ Σ 1 2 n R R−→(Q ), R R−→(Q ) . 1 ≤ 1R 1 2 ≤ 2R 2 o

108 2.6 Extension to Multi-Antenna Bidirectional Relaying

For each pair of covariance matrices the achievable region is described by a pentagon. As in the scalar case, the encoding methods to achieve the vertices can be deduced from the single-user MIMO Gaussian channel. For the decoding the relay node applies successive interference cancellation so that each vertex corresponds to a certain decoding order. In more detail, we can achieve the vertex ν Q Q −→ Q Σ1 Q Q with Σ1( 1, 2):=[R1R( 1), R2 ( 1, 2)]

RΣ1(Q , Q ) :=RMAC(Q , Q ) R−→(Q ) 2 1 2 Σ 1 2 − 1R 1 2 H H det σ IN + H Q H + H Q H = log R 1 1 1 2 2 2 , (2.74) 2I H Q HH det σ NR + 1 1 1  if node 1 encodes as in single-user Gaussian MIMO channel to achieve the rate −→ Q . R1R( 1) It therefore uses a code with codewords distributed according to a circularly symmetric 0 complex Gaussian distribution ( , Q1). Node 2 encodes as in the single-user Gaussian CN Σ1 MIMO channel to achieve the rate R2 (Q1, Q2). The relay node first decodes the message of node 2 with high probability while it considers the interference of node 1 as additional H Gaussian noise with covariance H1Q1H1 . After the message of node 2 is determined, the relay can cancel the interference H2X2 from the receive vector Y R so that it can decode the message of node 1 with high probability.

Similarly, we can achieve the vertex ν Q Q 2Σ Q Q −→ Q with 2Σ( 1, 2):=[R1 ( 1, 2), R2R( 2)]

R2Σ(Q , Q ) :=RMAC(Q , Q ) R−→(Q ) 1 1 2 Σ 1 2 − 2R 2 2 H H det σ IN + H Q H + H Q H = log R 1 1 1 2 2 2 2I H Q HH det σ NR + 2 2 2  by interchanging the decoding order and the corresponding encoding at nodes 1 and 2. In accordance, let πk, k = 1, 2, denote the decoding order where node k is decoded last. However, in contrast to the scalar case there are in general no input distributions so that the sum-rate and individual rate constraints are tight simultaneously. This means that the pair of covariance matrices which maximize the individual rate constraints in general do not maximize the sum-rate constraint as well. Therefore, the capacity region of the Gaussian MIMO-MAC is given by the convex hull of the union over all circularly symmetric complex Gaussian inputs that satisfy the power constraints, tr(Q ) P , k ≤ k

MIMO := co MIMO(Q , Q ) . CMAC  CMAC 1 2  tr(Qk)≤[Pk,k=1,2   This means that the capacity region MIMO is the convex hull of the union over all pentagons CMAC corresponding to a pair of covariance matrices. In general we will have two curved sections

109 2 Bidirectional Relay Communication using Superposition Encoding on the boundary, each corresponds to a certain decoding order. Thereby, each rate pair on the curved section is achieved by an individual set of covariance matrices. The sum-rate optimal section between the curved parts can only be achieved with time-sharing. Finally, we will have sections where we achieve the single-user capacities. It can be easily seen by contradiction that for any rate pair on the boundary the power constraints are satisfied with equality. In [WB04] the discussion of the boundary is presented for an arbitrary number of users, we briefly look at the sections of the boundary for our two user multiple access channel. Since the boundary of a convex set can be characterized by rate pairs that maximize the weighted rate sum we consider the optimization problem

MIMO RMAC (q) = arg max q1R1 + q2R2 (2.75) MIMO [R1,R2]∈CMAC

2 for a weight vector q Ê 0 . There are multiple solutions if we have q = q , ∈ + \ { } 1 2 q1 = 0, q2 > 0, or q1 > 0, q2 = 0, which gets clearer from the following.

First, we consider weight vectors q with q1 > 0 and q2 = 0. This means, we want to maximize the unidirectional rate R1 which then corresponds to the single-user capacity. Therefore, we have to maximize (2.73a) according to the water-filling procedure given in the previous section which gives us

∗ ∗ R−→ := max R1 = max R−→(Q )= R−→ (Q ) 1R 1R 1 1R 1 R∈CMAC Q1 :tr(Q1)≤P1

∗ H using the water-filling solution Q1 := Q(H1 H1, P1). To achieve this we have to apply the Σ1 ∗ decoding order π1 which allows node 2 to transmit with rates R2 (Q1, Q2). Then with the H 1 ∗ H −1 Cholesky-decomposition C1C1 := (INR + σ2 H1Q1H1 ) we can define an equivalent channel H˜ 2 := C1H2 so that we can rewrite (2.74) as follows

Σ1 ∗ 1 ˜ ˜ H R2 (Q1, Q2) = log det INR + σ2 H2Q2H2 .   ˜ H ˜ Σ1 ∗ Then the water-filling solution Q(H2 H2, P2) maximizes the rate R2 (Q1, Q2). Both to- gether gives us the first characteristic rate pair and section where node 1 achieves its single- user capacity

∗ Σ1 ∗ H E1 := R−→ , R Q , Q(H˜ H˜ 2, P2) , 1R 2 1 2 h ∗ Σ1 ∗ i H 1 := [R−→, R2] : 0 R2 R Q ,Q(H˜ H˜ 2, P2) . E 1R ≤ ≤ 2 1 2 n o The same procedure applies to weight vectors q with q1 = 0 and q2 > 0 so that we get the corresponding characteristic rate pair and section where node 2 achieves its single-user

110 2.6 Extension to Multi-Antenna Bidirectional Relaying capacity

Σ1 ∗ H ∗ E2 := R Q , Q(H˜ H˜ 1, P1) , R−→ , 2 2 1 2R h ∗ 2Σ iH ∗ 2 := [R1, R−→] : 0 R1 R  Q(H˜ H˜ 1, P1), Q E 2R ≤ ≤ 1 1 2 n ∗ ∗ o with the maximal unidirectional rate R−→ := R−→ (Q ) achieved with the water-filling so- 2R 2R 2 ∗ H ˜ H ˜ ˜ lutions Q2 := Q(H2 H2, P2) and Q(H1 H1, P1) with the equivalent channel H1 := H 1 ∗ H −1 C2H1 using the Cholesky-decomposition C2C2 := (INR + σ2 H2Q2H2 ) . For q q it is shown in [BW06] that the decoding order π is optimal. For that reason we 1 ≥ 2 1 can rewrite (2.75) as follows

MIMO Σ1 RMAC (q) = arg max q1R−→(Q1)+ q2R2 (Q1, Q2) MIMO 1R [R1,R2]∈CMAC −→ Q MAC Q Q = arg max (q1 q2)R1R( 1)+ q2RΣ ( 1, 2). MIMO − [R1,R2]∈CMAC With q q the objective is a sum of concave functions and therefore the optimization 1 ≥ 2 problem is convex [BW06]. Similarly, it is shown that the decoding order π2 is optimal for weight vectors with q q . 2 ≥ 1 In the following we look at the Lagrangian function of the optimization problem for the case q q , 1 ≥ 2 L(Q , Q , Ψ , Ψ , µ , µ )= (q q )R−→(Q ) q RMAC(Q , Q ) 1 2 1 2 1 2 − 1 − 2 1R 1 − 2 Σ 1 2 2 2 Ψ µk Pk tr(Qk) tr(Qk k). − k=1 − − k=1 P  P MIMO Similarly to [WB04] the optimal transmit strategies Q1 and Q2 for a rate pair RMAC (q) are uniquely characterized by the Karush-Kuhn-Tucker (KKT) conditions

µ I + Ψ =HH (q q ) σ2I + H Q HH −1 1 N1 1 1 2 − 1 NR 1 1 1 2 H H −1 q2 σ IN + H Q H + H Q H H , (2.76a) − R 1 1 1 2 2 2 1 H 2 H H −1 µ2IN + Ψ2 = q2H σ IN + H Q H + H Q H  H , (2.76b) 2 − 2 R 1 1 1 2 2 2 2 tr(Q Ψ ) = 0, µ (P tr(Q )) = 0, k = 1, 2, (2.76c) k k k k − k  Ψ 0 , µ 0, k = 1, 2, (2.76d) k  Nk k ≥ Q 0 , P tr(Q ), k = 1, 2, (2.76e) k  Nk k ≥ k with complementary slackness, dual, and primal conditions (2.76c), (2.76d), and (2.76e) respectively. Since the optimization problem is convex, efficient algorithms, like the interior- point method, exist to calculate the optimal covariance matrices [BV04]. This allows us

111 2 Bidirectional Relay Communication using Superposition Encoding

to specify the curved section on the boundary corresponding to the decoding order π1 as follows MIMO 2 := R (q): q Ê , q q > 0 . D1 MAC ∈ + 1 ≥ 2 Furthermore, we denote by D the sum-rate maximum RMIMO([1, 1]) . 1 MAC ∈ D1 Similarly, in the case q q the decoding order π is optimal. Then the Lagrange function 1 ≤ 2 2 and KKT conditions follow by interchanging the indices 1 and 2 so that the set

MIMO 2 := R (q): q Ê , q q > 0 D2 MAC ∈ + 1 ≤ 2  denotes the curved section on the boundary corresponding to the decoding order π2. Accord- ingly, let D = RMIMO([1, 1]) denote its sum-rate maximum. 2 MAC ∈ D2 The last section on the boundary is given by the connecting line between the sum-rate max- ima D1 and D2,

:= R : R = τD + (1 τ)D ,τ [0, 1] T 1 − 2 ∈  and can be reached by time-sharing between the corresponding strategies of D1 and D2 only. If one is interested in sum-rate optimal rate pairs only, one can also use an iterative water-filling algorithm presented in [YRBC01]. In Figure 2.21 we depicted the characteristic sections and rate pairs of the capacity region MIMO for an example where each node is equipped with two antennas. CMAC

2.6.2 MIMO Broadcast Phase

As in the scalar case in the BC phase the relay forwards the messages m1 and m2 which it has received in the previous MIMO MAC phase. Since we consider in this chapter superposition encoding, the messages are separately encoded and afterwards the superposition of both is transmitted. Again, since we assume a memoryless channel, it is sufficient to consider NR vector-valued single-letters only. To this end, let W 1 C denote a single-letters of the NR∈ codeword for message m1 for node 2 and W 2 C a single-letter of the codeword m2 for node 1 so that the input of the relay node in the∈ broadcast channel is given by the sum

XR = W 1 + W 2.

We assume that the messages m1 and m2 are independent so that the random vectors W 1 and W 2 are independent as well. From this we get the vector-valued output at node k, k = 1, 2, as follows

H H H Y k = Hk XR + N k = Hk W 1 + Hk W 2 + N k, k = 1, 2.

112 2.6 Extension to Multi-Antenna Bidirectional Relaying

As in the scalar case, the receiving nodes perform interference cancellation so that we essen- tially have two interference-free MIMO Gaussian channels between the relay node and the nodes 1 and 2. It follows that the achievable rates for transmitting the unknown messages have to fulfill the constraints

R I(X ; Y W )= I(W ; HH W + N ), 2 ≤ R 1| 1 2 1 2 1 R I(X ; Y W )= I(W ; HH W + N ) 1 ≤ R 2| 2 1 2 1 2 for some input distributions fW 1 (w1) and fW 2 (w2) which satisfy the power constraint

H H H

E E E X X = W W + W W P . { R R} { 1 1} { 2 2}≤ R Obviously, the mutual informations are only coupled by the relay power distribution. As in the scalar case, we denote by β1 and β2 the proportion of relay transmit power PR spend for the codewords W 1 and W 2 respectively. Then the simplex

= [β ,β ] [0, 1] [0, 1] : β + β 1 B { 1 2 ∈ × 1 2 ≤ } characterizes the set of feasible relay power distributions that satisfy the relay transmit power constraint.

For any feasible relay power distribution [β1,β2] we have two separated MIMO Gaus- sian channels so that circularly symmetric complex∈ Gaussian B distributed inputs

W (0, Q (β )) with Q (β ) := Q(H HH ,β P ), 1 ∼ CN R,1 1 R,1 1 2 2 1 R W (0, Q (β )) with Q (β ) := Q(H HH ,β P ) 2 ∼ CN R,2 2 R,2 2 1 1 2 R maximize the mutual informations. Thereby, the optimal covariance matrices QR,1(β1) and QR,2(β2) are given by the water-filling solution as described for the Gaussian MIMO chan- nel in Section 2.6. Therefore, in the MIMO BC phase we can achieve rate pairs within the rate region

MIMO 2 = [R , R ] Ê : R R−→(β ), R R−→(β ), [β ,β ] RBC 1 2 ∈ + 1 ≤ R2 1 2 ≤ R1 2 1 2 ∈ B n o with rate constraints

−→ I 1 HH Q H (2.77) RR2(β1) := log det N2 + σ2 2 R,1(β1) 2 , −→ I 1 HH Q H (2.78) RR1(β2) := log det N1 + σ2 1 R,2(β2) 1 for the MIMO broadcast channel. It can be easily seen by contradiction that for any rate pair on the boundary of the achievable rate region we have β1 + β2 = 1. From the water-filling solution we see that with increasing power it is optimal to increase the number of the used eigenmodes if the power exceeds certain thresholds. In the low-power

113 2 Bidirectional Relay Communication using Superposition Encoding regime we use the strongest eigenmode of the channel only, which is known as beamform- ing. In the high-power regime it is optimal to use all eigenmodes. The maximal number of eigenmodes is given by the rank of the channel matrix. In the next proposition we specify the threshold values which also characterize the so-called beamforming optimality range and high-power regime. To this end, let H Σ H Σ HkHk = V k kV k , with k := diag(λk,1, λk,2,...,λk,NR )

NR×R H NR×R C with unitary matrix V C be the eigenvalue decomposition of H H , k ∈ k k ∈ k = 1, 2 with eigenvalues sorted in decreasing order, i.e. λ λ 0. Further- k,1 ≥···≥ k,NR ≥ more, we define the coefficients

m 1 Lk,m := , k = 1, 2 λk,i Xi=1 for m = 1, 2,...,r2 for k = 1 and m = 1, 2,...,r1 for k = 2 respectively and Lk,0 := 0 for k = 1, 2.

Proposition 2.52. For k = 1 with r2 = rank(H2) maximal possible eigenmodes it is optimal to use

2 r2−1 r2 eigenmodes, if β1PR >σ λ L2,r2−1 , 2,r2 −  2 1 1 eigenmode, if β1PR σ λ L2,1 ,or   ≤ 2,2 −  2 m 2 m m eigenmodes, if σ L2,m−1 <β 1PR σ L2,m . λ2,m − ≤ λ2,m+1 −    Similarly, for k = 2 with r1 = rank(H1) maximal possible eigenmodes it is optimal to use

2 r1−1 r1 eigenmodes, if β2PR >σ λ L1,r1−1 , 1,r1 −  2 1 1 eigenmode, if β2PR σ λ L1,1 ,or   ≤ 1,2 −  2 n 2 m m eigenmodes, if σ L1,m−1 <β 2PR σ L1,m . λ1,m − ≤ λ1,m+1 −     Proof. The proof can be found in Appendix 2.8.34.

Next, we are interested in the weighted rate sum maximum

MIMO RBC (q) := arg max q1R1 + q2R2. (2.79) MIMO [R1,R2]∈RBC

Since MIMO is convex, the strategy is similar to the previous derivations where we look for RBC the rate pair on the boundary whose normal vector has the same angle than the weight vector

114 2.6 Extension to Multi-Antenna Bidirectional Relaying q. Therefore, we have to identify for each rate pair on the boundary MIMO the number of RBC used eigenmodes of the channels Hk, k = 1, 2.

Proposition 2.52 characterizes the number of eigenmodes with respect to the power β1PR and β P . We will look at a parametrization of the boundary in terms of β = β = 1 β . 2 R 1 − 2 Therefore, we solve the power threshold values for β1 and β2 so that we can express the threshold values in terms of the power fraction as follows 1 m β1,m := L2,m , m = 1, 2,...,r2 1, γR λ2,m+1 − − 1 m  β2,m := L1,m , m = 1, 2,...,r1 1. γR λ1,m+1 − −  Additionally, we define the value βk,0 := 0, k = 1, 2, as the value where no eigenmode is used. In order to identify the number of eigenmodes used for a given relay power fraction β1 or β2 we define the intervals

:= (β ,β ], m = 1, 2,...,r 1, B1,m 1,m−1 1,m 2 − := (β ,β ], m = 1, 2,...,r 1 B2,m 2,m−1 2,m 1 − with := (β , ), := (β , ), and := 0 , k = 1, 2. Therewith, B1,r2 1,r2−1 ∞ B2,r1 1,r1−1 ∞ Bk,0 { } we can define the following indicator functions

m : [0, 1] 0, 1, 2,...,r , β m where we have β , 1 → { 2} 1 7→ 1 ∈ B1,m m : [0, 1] 0, 1, 2,...,r , β m where we have β , 2 → { 1} 2 7→ 2 ∈ B2,m which specify the numbers of used eigenmodes for a power fraction β1 or β2. Obviously, for we have −→ and for we have −→ . For the β1 = 0 RR2(β1) = 0 β2 = 0 RR1(β2) = 0 β1,β2 > 0 characterization of the used eigenmodes allows us to state in the next proposition a closed form solution of the rates −→ and −→ , which we use for the derivation of the RR2(β1) RR1(β2) weighted rate sum optimal rate pair.

Proposition 2.53. The rates −→ or −→ are zero if or are equal to zero. For RR2(β1) RR1(β2) β1 β2 β1,β2 > 0 we have

m1(β1) λ2,n R−→(β )= log (β γ + L ) , R2 1 m (β ) 1 R 2,m1(β1) n=1 1 1 X   m2(β2) λ1,n R−→(β )= log (β γ + L ) . R1 2 m (β ) 2 R 1,m2(β2) n=1 2 2 X  

Proof. The proof can be found in Appendix 2.8.35.

115 2 Bidirectional Relay Communication using Superposition Encoding

Then

M := β : β 1 for m = 0, 1, 2,...,r 1 and 1 1,m 1,m ≤ 2 − M2 := β2,m : β2,m 1 for m = 0, 1, 2,...,r1 1 ≤ −  denote the numbers of maximal used eigenmodes. Next we define M := M1 + M2. Then let [β˜ , β˜ ,... β˜ ] denote the sorted vector of [β ,β ,...,β , 1 β , 1 1 2 M 1,0 1,1 1,M1−1 − 2,0 − β ,...,β ] in increasing order, i.e. we have 0= β˜ β˜ β˜ = 1. 2,1 2,M2−1 1 ≤ 2 ≤···≤ M

We are now prepared to characterize in closed form the rate pair which maximizes the weighted rate sum according to (2.79).

2 Theorem 2.54. Let q = [q , q ] Ê 0 denote a weight vector with nonnegative ele- 1 2 ∈ + \ { } q1 MIMO ments and angle θq := arccos 2 2 , then the rate pair RBC (q) where the weighted √q1 +q2 rate sum is maximized is given by 

[0, R2,BC([0, 1])], if θq ϕ1, MIMO ≥ RBC (q)= [R1,BC(q), R2,BC(q)], if ϕ1 > θq >ϕM , [R ([1, 0]), 0], if ϕ θq, 1,BC M ≥  with characteristic angles where the number of allocated eigenmodes changes

γ +L arctan R 1,M1 , if n = 1, M1L2,1 m (β˜ ) (1−β˜ )γ +L  1 n “ n R 1,m (1−β˜n)” ϕn := arctan 2 , if 1

0, if θq ϕ , ≥ 1 η1(q) := m (β˜ ), if ϕ > θq ϕ ,  1 n+1 n ≥ n+1  M1, if ϕM > θq,

M2, if θq >ϕ1, η2(q) := m (β˜ ), if ϕ θq >ϕ ,  2 n n ≥ n+1 0, if ϕ θq, M ≥ 

116 2.6 Extension to Multi-Antenna Bidirectional Relaying so that the rates are given by

η1(q) γR + L1,η2(q) + L2,η1(q) R1,BC(q) := log q1λ2,i , q1η1(q)+ q2η2(q) Xi=1   η2(q) γR + L1,η2(q) + L2,η1(q) R2,BC(q) := log q2λ1,i . q1η1(q)+ q2η2(q) Xi=1  

Proof. The proof can be found in Appendix 2.8.36.

2

Ê 0 With this theorem we can identify for any non-negative weight vector q + the Pareto optimal rate pair on the boundary of the BC phase. In Figure 2.21∈ we depicted\ { } the MIMO characteristic sections and rate pairs of the achievable rate region BC for an example where each node is equipped with two antennas. R

2.6.3 MIMO Bidirectional Achievable Rate Region

As in the scalar case we use the MAC and BC phases for a fraction of time only. Let the time division parameter α [0, 1] denote the fraction of time in the MAC phase so that ∈ 1 α characterizes the fraction of time in the BC phase. Therefore, we have to scale the − rate regions according to the time fraction. This means for a successful bidirectional relay transmission of a message m1 with rate R1 from node 1 to node 2 and message m2 with rate MIMO R2 from node 2 to node 1 the rate pair R = [R1, R2] has to be within α MAC as well as MIMO C within (1 α) BC . This means that for any given time division parameter α [0, 1] the bidirectional− achievableR rate pairs are given by the intersection of the scaled rate regions∈

MIMO(α) := α MIMO (1 α) MIMO, RBR CMAC ∩ − RBC which is convex since the intersection of convex sets is itself convex. Accordingly, the boundary is characterized by the rate pairs which maximize the weighted rate sum for weight 2 vectors q Ê 0 , ∈ + \ { } MIMO RBR (α, q) := arg max q1R1 + q2R2. MIMO [R1,R2]∈RBR (α)

Because of the difficult MIMO MAC capacity region the optimization problem cannot be solved in closed form as in the SISO case. However, for the solution we can distinguish

117 2 Bidirectional Relay Communication using Superposition Encoding

1.2 γ =1 E 1 2 γ =1 D 2 H = 1 ε 2 γ =1.2 1 2 D R 1 − 0.5j 1 − 0.5j 1 , [bit/channel use] 0.8 τ » −0.5 1.3 –

2 ε E 1 1 H2 = 0.6 0.4 − 0.4j 1.2 rate R 0.4 » 1.6 −0.2j– BR with λ1,1 = 3.16, λ1,2 = 1.28, 0.2 BC λ2,1 = 3.04, and λ2,2 = 1.32. MAC 0 0 0.2 0.4 0.6 0.8 1 1.2 rate R [bit/channel use] 1

Figure 2.21: MIMO achievable rate regions MIMO(1/2) with N = N = N = 2. RBR 1 2 R between the following cases. First we consider the cases where the optimal rate pair is also the optimal rate pair of the MAC or BC phase. Accordingly, we can conclude as follows

αRMIMO(q) MIMO(α) RMIMO(α, q)= αRMIMO(q), MAC ∈ RBR ⇒ BR MAC (1 α)RMIMO(q) MIMO(α) RMIMO(α, q) = (1 α)RMIMO(q). − BC ∈ RBR ⇒ BR − BC If both cases do not apply the boundaries have to intersect at least once. From the previous we know that a rate pair where the boundaries intersect is optimal for a range of weight MIMO MIMO MIMO vector angles. In the case where αRMAC (q), (1 α)RBC (q) / BR (α) the optimal MIMO − ∈ R rate pair RBR (α, q) is given by a rate pair where the boundaries intersect. Since multiple intersections may possible it remains to determine the intersection point which is optimal for the weight vector q. Unfortunately the characterization of the intersection points is much more involved than in the SISO case and cannot be solved in closed form.

As in the scalar case we can define the rate region and the weighted rate sum optimal rate pair for the optimal time division case as follows

MIMO MIMO MIMO BRopt := co α MAC (1 α) BC , R α∈[0,1] C ∩ − R ! MIMO S  RBRopt (q) := arg max q1R1 + q2R2, MIMO [R1,R2]∈RBRopt which we use to study the high-power behavior in the following.

118 2.6 Extension to Multi-Antenna Bidirectional Relaying

High Power Behavior

We can deduce the high power behavior from the asymptotic behavior of the maximal unidi- rectional rates for a fixed time division parameter α,

∗MIMO ∗ R (α) := min αR−→, (1 α)R−→(1) , 1 1R − R2 ∗MIMO n ∗ o R (α) := min αR−→, (1 α)R−→(1) , 2 2R − R1 n o and for the optimal time division,

∗ ∗ R−→R−→(1) R−→R−→(1) ∗MIMO 1R R2 ∗MIMO 2R R1 R1opt := ∗ , and R2opt := ∗ , R−→ + R−→(1) R−→ + R−→(1) 1R R2 2R R1 ∗ ∗ where R−→ and R−→ denote the maximal unidirectional rates in the MAC phase as defined 1R 2R in Section 2.6.1 and −→ and −→ denote the maximal unidirectional rates in the BC RR2(1) RR1(1) phase as defined in Section 2.6.2. In the high power regime it is asymptotically optimal to allocate equal proportions of power for each non-zero eigenmode. This means at high powers P1, P2, and PR we can approxi- ∗ mate R−→ and R−→(1), k = 1, 2, by kR Rk

rk rk ∗ Pk λk,n Pk λk,n R−→ log 1+ log , kR ≈ r σ2 ≈ r σ2 n=1 k n=1 k X   X   rk rk PR λk,n PR λk,n R−→(1) log 1+ log . Rk ≈ r σ2 ≈ r σ2 n=1 k n=1 k X   X  

For conceptual clarity we set P1 = P2 = PR = P . Then in the high power regime the rates scale linearly with the number of eigenmodes of the corresponding MIMO channel

∗ ∗ R−→ rk log(P )+ ck, and R−→(1) rk log(P )+ dk, kR ≈ Rk ≈ with constants ck and dk for k = 1, 2. Therewith, we get the asymptotic of the maximal unidirectional rates as follows15

R∗MIMO = min αr , (1 α)r log(P )+ o log(P ) , 1 { 1 − 2} R∗MIMO = min αr , (1 α)r log(P )+ o log(P ) , 2 { 2 − 1}  ∗MIMO r1r2 Rkopt = log(P )+ o log(P ) for k = 1,2. r1 + r2  15The little-o notation collects asymptotically insignificant terms of an expression. This means, if g(x) ∈ o(f(x)) it follows that we have lim g(x) = 0. x→∞ f(x)

119 2 Bidirectional Relay Communication using Superposition Encoding

This means that the maximal unidirectional rates for the fixed time division case scale with the minimum of the fraction of time weighted number of eigenmodes and for the optimal time division case scale with r1r2 . r1+r2 Since the rate regions MIMO(α), α [0, 1], and MIMO are convex, for the sum of any RBR ∈ RBRopt rate pair on the boundaries we have

min R∗MIMO, R∗MIMO RMIMO(α, q) R∗MIMO + R∗MIMO , { 1 2 } ≤ BR 1 ≤ 1 2 min R∗MIMO, R∗MIMO RMIMO(q) R∗MIMO + R∗MIMO. { 1opt 2opt } ≤ BRopt 1 ≤ 1opt 2opt  It follows that the asymptotics of the maximal unidirectional rates give us a lower and upper bound on the asymptotics of the sum-rate of the rate pairs on the boundary which we sum up in the following proposition.

Proposition 2.55. Let r1 = rank(H1) and r2 = rank(H2) denote the spatial degree offered by the channel between the relay node and the nodes 1 and 2 respectively. Then the asymptotic scaling of the sum of any rate pair on the boundary of the achievable rate MIMO MIMO regions BR (α) and BRopt with increasing power P can be upper and lower bounded as followsR R

RMIMO(α, q) (s + s ) log(P )+ o log(P ) , BR 1 ≤ 1 2 RMIMO(α, q) min s , s log(P )+ o log(P ) , BR 1 ≥ { 1 2} r r RMIMO q 1 2  BRopt ( ) 1 2 log(P )+ o log(P ) , ≤ r1 + r2 r r  RMIMO q 1 2 BRopt ( ) 1 log(P )+ o log(P ) . ≥ r1 + r2  with s := min αr , (1 α)r and s := min αr , (1 α)r . 1 { 1 − 2} 2 { 2 − 1} We see that as for the point-to-point MIMO channel the spatial degree results in a pre-log factor in the high power regime, which depends on the spatial degree of both MIMO channels as well as on the time division between the phases.

2.7 Discussion

We considered various cross-layer design aspects for a two-phase bidirectional decode-and- forward relaying protocol using superposition encoding in the broadcast phase which was proposed first by Rankov and Wittneben in [RW05b, RW07]. In their work they propose half-duplex relaying protocols with increased spectral efficiency and show by comparing

120 2.7 Discussion the maximal achievable ergodic sum-rates of the proposed bidirectional protocols and the achievable ergodic rates of the proposed unidirectional protocols that the bidirectional ap- proaches can “recover a large portion of the half-duplex loss.” After that they did not carry on research to explore further properties of their bidirectional protocols.

On that score in Section 2.2 we have extensively studied the bidirectional decode-and- forward protocol for a three-node network assuming single-antenna nodes. First, it is im- portant to realize that a bidirectional relaying protocol is characterized by two achievable rates. This means that we have to examine a two-dimensional achievable rate region. Then it easily follows that the achievable rate region is given by the intersection of the scaled rate regions of the multiple access and broadcast phases. In this chapter, the relay node applies superposition encoding technique to forward the messages in the broadcast phase as pro- posed by Rankov and Wittneben. The characterization of the intersection of achievable rate regions usually results in a combinatorial problem. Theorem 2.5 and its corollaries reveal the combinatorial structure of the bidirectional achievable rate region for the equal time division case. In particular it allows us to characterize the sum-rate maximum in Corollary 2.8, which Rankov and Wittneben characterize with some simplifying assumptions only. Since the in- tersection of convex sets is itself convex, we know from convex theory that the boundary of the achievable rate region is characterized by the rate pairs which maximize the weighted rate sum. Theorem 2.10 characterizes in closed form the optimal rate pairs for any positive weight vector using the knowledge of the combinatorics.

Another simple extension is to relax their equal time division assumption from which it is natural to ask for the optimal time division. The achievable rate region of the optimal time division case is given by the union over all time division parameters and therefore need not be convex. However, in Corollary 2.13 we have concluded that the region is indeed convex using the equivalent description of the achievable rate region proved in Theorem 2.12. From Proposition 2.14 we see that the combinatoric of the MAC capacity region transfers to the bidirectional rate region. Again, in Theorem 2.16 we characterize the boundary of the achievable rate region with the optimal time division by the rate pairs that maximize the weighted rate sum. Since the boundary rate pairs of a convex set are Pareto optimal in the sense that we cannot increase one rate without decreasing the other, its characterization is crucial for the succeeding cross-layer designs.

For the two phase protocol there are two possibilities to interpret the mean power input con- straint of a Gaussian continuous-alphabet channel with respect to a code word. We can either consider each phase separately, which means that we average over all actually transmitted symbols of each phase, or we average over both phases so that we scale the mean power constraints according to the inverse of the time division parameter. While for the equal time division case the results for both models can be obtained by an appropriate substitution, for the optimal time division case the non-linear dependence on the time division case makes a reconsideration for the second model necessary. Accordingly, in Theorem 2.39 we find

121 2 Bidirectional Relay Communication using Superposition Encoding an equivalent characterization of the achievable rate region. Furthermore, in Theorem 2.24 we show that the combinatoric of the MAC capacity region transfers to bidirectional achiev- able rate region as well. And finally, in Theorem 2.26 we establish the convexity of the rate region. The non-linear dependence of the rate constraints on the time division hinders the derivation of closed-form results. However, the obtained results makes efficient algorithmic optimization solutions feasible.

In Section 2.3 we use the results for a cross-layer design across the Data Link Layer and Physical Layer, where we are interested in an efficient resource allocation with respect to the traffic generated at higher layers. Therefore, we assume stationary and ergodic time- variant block-fading channel processes. At nodes 1 and 2 we consider queues with infinite buffer length and a centralized controller which slot-wise adapts the service rates according to the maximum weighted rate sum with weights equal to the buffer length. Since this pol- icy is based on the maximum differential backlog algorithm of Tassiulas and Ephrimedes [TE93], we can use ”standard” Lyapunov drift techniques to characterize the arrival rates under which the policy guarantees queue stability. In Corollary 2.30 we adapt the proof from [NMR03] to show that the stability region is equal to the bidirectional ergodic rate region by proving a negative drift of a quadratic Lyapunov function on the buffer levels whenever the mean number of unfinished work is large. Moreover, it follows that the mean delay behaves asymptotically to the inverse of the distance of the bit arrival rate vector to the boundary of the stability region. The following numerical simulations confirm the stability results and illustrate the efficiency of the bidirectional relay protocol for the equal and optimal time division case compared to classical Round-Robin strategies.

In a network where N relay nodes are willing to support the bidirectional communication it is a fundamental problem to identify the best relay node. But again, since bidirectional communication is characterized by two rates, this problem is a vector optimization problem so that relay selection for a bidirectional protocol is more involved than for unidirectional relaying protocols. In Section 2.4 we derive a relay selection criterion based on the achiev- able rate region of each relay node. From the Propositions 2.32 and 2.37 we can conclude that the probability that the achievable rate region of one relay node contains the rate region of all others decreases with an increasing number of relay nodes N, which means that there is more often no over-all best relay node. For that reason we propose to select the optimal relay node individually for any Pareto optimal rate pair on the boundary of the achievable rate region. Moreover, from Figure 2.10 we see that if two relay nodes achieve the same weighted rate sum for a certain weight vector, we can enlarge the achievable rate region if we allow time-sharing between the usage of the corresponding relay nodes.

For iid Rayleigh fading channels and for the equal time division case in Theorem 2.40 we show that the growth of the maximal unidirectional ergodic rates is asymptotically equal to 1/2 log(ln(N)), which is the same scaling law achieved with the separation based relaying approach in [DSG+03]. Since the sum-rate of any ergodic rate pair on the boundary of the

122 2.7 Discussion ergodic rate region for the equal and optimal time division cases can be upper and lower bounded by the maximal unidirectional rates of the equal time division case, in the Corol- laries 2.42 and 2.44 we conclude that the ergodic sum-rate of any boundary rate pair scales with Θ log(log(N)) as well. Relay selection is obviously a routing problem, which belongs to the Network Layer. Then for relay selection in a wireless system it remains to decide for a weight vector. We can again look at this problem from a cross-layer design perspective. This means that if we use the buffer levels as the weight vector we tie together relay selection with the maximum throughput policy of Section 2.3. It follows that we end up with a load adaptive routing protocol where the routing policy takes the resource allocation, the channel states as well as the queue states into account. In Section 2.5 we consider the next cross-layer design approach where we study the joint resource allocation of two routing tasks. For this purpose, we add in the broadcast phase a multicast communication from the relay node to the nodes 1 and 2 to the bidirectional relaying protocol. The goal is to realize synergistic efficiency and enable rate trade-offs by converging two routing schemes. Moreover, if the relay does not fully exploit its transmit power constraint for the bidirectional communication, the relay can add the relay multicast communication without worsening the bidirectional communication. For that reason and in dependence to piggyback communication on higher layer protocols, we call this approach piggyback on bidirectional communication. We see this as the first step in integrating bidi- rectional relay communication in a wireless network. In Theorem 2.45 we show that for the receiving decode-and-forward nodes 1 and 2 it is always optimal to decode the relay message first. This fixed decoding order simplifies fol- lowing case studies, but the explicit characterization is still exhaustive. Then Theorem 2.48 specifies the total sum-rate maximum of the bidirectional rates and the additional relay mul- ticast rate. We see that the total sum-rate behavior is dominated by the function which char- acterizes the rate pairs where the sum-rate maximum of a broadcast rate region is attained for a certain relay power. In Corollary 2.49 we identify a rate trade-off between additional relay rate and one bidirectional rate where the total sum-rate remains constant. In the follow- ing combinatorial discussion we look at some examples and work out some further aspects, which are interesting for the design and operation of service adapted network protocols. In particular we change the point of view and optimize the bidirectional communication while we desire a certain relay rate for a multicast application or we discuss the total sum-rate maximum with respect to the time division parameter. Most of the closed form results can be obtained for the equal time division case only, but the behavior for any fixed time division will be similar. In Section 2.6 we extend the bidirectional decode-and-forward relaying protocol using super- position encoding to vector-valued processing. For this purpose, we assume that each node is equipped with multiple antennas and that each transmitter has perfect channel knowledge as

123 2 Bidirectional Relay Communication using Superposition Encoding well. Accordingly, we present the optimal transmit strategies at each node for both phases. In the BC phase the optimal transmit strategy is given by two point-to-point water-filling so- lutions which are only coupled by the relay power distribution. This allows us to characterize the rate pair which maximizes the weighted rate sum in Theorem 2.54. A combinatorial dis- cussion of the achievable rate region as in the SISO case is not possible in the MIMO case because of the complicated structure of the MIMO-MAC capacity region. However, from the maximal unidirectional rates in the high power regime we find a scaling law for the max- imal unidirectional rates, which depends on spatial degrees of the MIMO channels as well as on the time division between the phases. In Proposition 2.55 we use the scaling law for the maximal unidirectional rates to upper and lower bound the sum-rate of any rate pair on the boundary of the achievable rate regions for the fixed and optimal time division case. Nevertheless, one can directly apply the ideas of the previous sections to the MIMO case, which means that for an optimal throughput in a system the rates should be allocated accord- ing to the queue states, the relay selection should be performed with respect to the achievable rate region, and the resource efficiency can be improved if we consider the joint resource al- location of multiple routing tasks.

124 2.8 Appendix: Proofs

2.8.1 Proof of Proposition 2.2.3

Let [R , R ] , i = 1, 2 denote two arbitrary achievable rate pairs. It follows that 1i 2i ∈ RBC there exist feasible relay power distributions [β ,β ] with R = R−→(β ) and R = 1i 2i ∈ B 1i R2 1i 2i −→ for . From the concavity of the logarithm we can conclude that for any RR1(β2i) i = 1, 2 t [0, 1] we have ∈ tR + (1 t)R = tR−→(β ) + (1 t)R−→(β ) R−→(β (t)), 11 − 12 R2 11 − R2 12 ≤ R2 1 tR + (1 t)R = tR−→(β ) + (1 t)R−→(β ) R−→(β (t)) 21 − 22 R1 21 − R1 22 ≤ R1 2 with β (t) := tβ + (1 t)β , k = 1, 2. Since [β ,β ] , we have β + β 1 for k k1 − k2 1i 2i ∈ B 1i 2i ≤ i = 1, 2 so that for any t [0, 1] we have ∈ 2 β (t)= tβ + (1 t)β + tβ + (1 t)β t + (1 t) = 1. k 11 − 12 21 − 22 ≤ − Xk=1 This means that for any t [0, 1] we have [β (t),β (t)] and therefore ∈ 1 2 ∈ B [R−→(β (t)), R−→(β (t))] . It follows that any convex combination of achievable R2 1 R1 2 ∈ RBC rate pairs is achievable, which proves that is convex. RBC

2.8.2 Proof of Proposition 2.2

The sum-rate maximum is obviously attained on the boundary of BC. The boundary is parametrized by (2.8). Therefore, we consider the sum-rate R

R−→(β)+ R−→(1 β) = log (1 β h 2γ )(1 (1 β) h 2γ ) , R2 R1 − − | 2| R − − | 1| R :=fBC(β)  | {z } which is maximized for the same β as the concave parabola fBC(β). The concave parabola f(β) is maximized at its vertex

2 2 ⋆ ⋆ 1 1 1 1 1 2 |h1| 2 |h2| [β , fBC(β )] = + 2 2 , (1 + γR h1 + 2 )(1 + γR h2 + 2 ) . 2 2γR |h1| − |h2| 4 | | |h2| | | |h1| h  i This characterizes the maximum sum-rate if β⋆ is a feasible relay power distribution, i.e. ⋆ ⋆ β [0, 1]. If we have β < 0, the function fBC(β) is strictly decreasing on [0, 1] so that ∈ ⋆ the maximum sum-rate is attained at RBC(0). On the other hand, if we have β > 1, the function fBC(β) is strictly increasing on [0, 1] so that the maximum sum-rate is attained at RBC(1). 2 Bidirectional Relay Communication using Superposition Encoding

2.8.3 Proof of Theorem 2.5

For a given relay power distribution β = β = 1 β [0, 1] the maximal sum-rate has to 1 − 2 ∈ satisfy 1 MAC RΣ(β) = max R1 + R2 < /2RΣ , R∈RBReq(β) because of the MAC sum-rate constraint (2.4c). Furthermore, the unidirectional rate R1 has to satisfy the individual rate constraint (2.4a) of the MAC phase and (2.7a) of the BC phase and similarly the unidirectional rate R2 has to satisfy (2.4b) and (2.7b) so that we have

R 1/2 min R−→, R−→(β) and R 1/2 min R−→, R−→(1 β) . 1 ≤ { 1R R2 } 2 ≤ { 2R R1 − } The combination of all constraints gives us the maximum sum-rate

MAC R (β)= 1/2 min min R−→, R−→(β) + min R−→, R−→(1 β) , R Σ { 1R R2 } { 2R R1 − } Σ = 1/2 min R−→ + R−→(1 β), R−→(β)+ R−→, R−→(β)+ R−→(1 β),  1R R1 − R2 2R R2 R1 − −→ −→ MAC  R1R + R2R, RΣ 1 MAC = /2 min R−→ + R−→(1 β), R −→(β)+ R−→, R−→(β)+ R−→(1 β), RΣ 1R R1 − R2 2R R2 R1 − (2.80)  using R−→ +R−→ = log (1+γ h 2)(1+γ h 2) log(1+γ h 2 +γ h 2)= RMAC 1R 2R 1| 1| 2| 2| ≥ 1| 1| 2| 2| Σ in the last equality.  For the next equality we have to examine the combinatorics of (2.80). This becomes clearer if we discuss the geometry of the arguments of the logarithms of the rates. Accordingly, we define the following functions

RMAC 2 2 f (β):=2 Σ =1+ γ h + γ h , Σ 1| 1| 2| 2| R−→+R−→(1−β) 2 2 f (β):=2 1R R1 = (1+ γ h )(1 + (1 β)γ h ), 1 1| 1| − R| 1| R−→+R−→(β) 2 2 f (β):=2 2R 2R = (1+ γ h )(1 + βγ h ), 2 2| 2| R| 2| R−→(1−β)+R−→(β) 2 2 f (β):=2 R1 R2 = (1 + (1 β)γ h )(1 + βγ h ), BC − R| 1| R| 2| where we easily see that fΣ(β) is a constant function, f1(β) is a linearly decreasing function, f2(β) is a linearly increasing function, and fBC(β) is a concave parabola, which we already know from the Proof of Proposition 2.2. To solve (2.80) we will study the function

min f (β), f (β), f (β), f (β) (2.81) { 1 2 Σ BC } for β [0, 1] in the following. In Figure 2.22 we depicted two representative examples. ∈ The intersection points characterize the combinatorics of the rate region and identify the active restriction for each feasible power distribution β [0, 1]. In the following derivation ∈

126 2.8 Appendix: Proofs

|h |2 =0.4 |h |2 =0.8 2.2 1 1 2 2 |h | =0.5 ← f (β) |h | =0.7 f (β)→ 2 2 2 2 γ =1.4 2.2 f (β)→ γ =0.4 f (β)→ 1 1 1 1 γ =0.9 γ =1 2 ↓ f (β) 2 2 γ =1.3 BC γ =1.2 f (β)↑ R R ) Σ ) β β ( ( 2 f ( ) BC BC β ↑ Σ ,f ,f Σ Σ ,f ,f

2 1.8 2 ,f ,f 1 1 f f f (β)↓ 1.8 BC

1.6

1.6 ⋆ β β 0 β2B β21 β βB1 1 0 βBΣ β2Σ βΣ1 βΣB 1

⋆2 Figure 2.22: Exemplary plots for the discussion of f1(β), f2(β), fΣ(β), and fBC(β) for β < ∆β in the left figure and β⋆2 ∆β in the right figure. ≥ of the combinatorics we first neglect the feasibility, but later we will take the feasibility into account. With simple calculations of the intersection points between f1(β), fΣ(β), f2(β), and fBC(β) it is easily seen that we have

f (β) f (β) for β [β , ) and f (β) f (β) for β ( ,β ], (2.82a) 1 ≤ Σ ∈ Σ1 ∞ 1 ≥ Σ ∈ −∞ Σ1 f (β) f (β) for β ( ,β ] and f (β) f (β) for β [β , ), (2.82b) 2 ≤ Σ ∈ −∞ 2Σ 2 ≥ Σ ∈ 2Σ ∞ f (β) f (β) for β [β ,β ] and f (β) f (β) for β ( ,β ] [β , ), 1 ≤ BC ∈ B1 1B 1 ≥ BC ∈ −∞ B1 ∪ 1B ∞ (2.82c) f2(β) fBC(β) for β [βB2,β2B] and f2(β) fBC(β) for β ( ,βB2] [β2B, ), ≤ ∈ ≥ ∈ −∞ ∪ (2.82d)∞ f (β) f (β) for β ( ,β ] and f (β) f (β) for β [β , ) (2.82e) 2 ≤ 1 ∈ −∞ 21 2 ≥ 1 ∈ 21 ∞ with βΣ1, β2Σ, βB1, β1B, βB2, and β2B as given in the theorem and β21 := 2 2 2 (1+γ1|h1| )(1+γR|h1| )−(1+γ2|h2| ) 2 2 2 2 . Furthermore, we have (1+γ1|h1| )γR|h1| +(1+γ2|h2| )γR|h2|

2 2 2 2 2 2 2 (1+γ1|h1| )(1+γ2|h2| )(γR|h1| +γR|h2| +γR|h1| |h2| ) f1(β21) = f2(β21)= 2 2 2 2 > 0. (2.83) (1+γ1|h1| )γR|h1| +(1+γ2|h2| )γR|h2|

It follows that we have βB2 < β21 < β1B since we have f1(β1B) = f2(βB2) = 0 and the linear functions f1(β) and f2(β) are strictly decreasing and increasing.

If we multiply the left and the right hand side of f (β ) = (1+γ h 2)(1+(1 β )γ h 2) 1 21 1| 1| − 21 R| 1| to the left and right hand side of f (β ) = f (β ) = (1+ γ h 2)(1 + β γ h 2) we 1 21 2 21 2| 2| 21 R| 2|

127 2 Bidirectional Relay Communication using Superposition Encoding get

2 f (β ) = (1+ γ h 2)(1 + γ h 2)(1 + βγ h 2)(1 + (1 β )γ h 2) (2.84) 1 21 2| 2| 1| 1| R| 2| − 21 R| 1|   :=c21 =fBC(β21) with c = (1+γ| h 2)(1+γ{zh 2) > (1+}|γ h 2+γ h 2){z = f (β) for all β. Therewith,} 21 2| 2| 1| 1| 1| 1| 2| 2| Σ we will prove f (β ) = f (β ) > min f (β ), f (β ) (2.85) 1 21 2 21 { Σ 21 BC 21 } next. First, we consider the case f (β ) f (β ) so that we can conclude Σ 21 ≤ BC 21 f (β )2 < f (β )c f (β )c = f (β )2 Σ 21 Σ 21 21 ≤ BC 21 21 1 21 using (2.84). Since we know from (2.83) that f1(β21) > 0 and fΣ(β) > 0 for all β, it follows that we have f1(β21) = f2(β21) > fΣ(β21) so that (2.85) is fulfilled for this case. Otherwise, if fΣ(β21) > fBC(β21) we have fBC(β21) < c21 since fΣ(β21) < c21 holds. Then from (2.84) it follows that 2 2 fBC(β21) < c21fBC(β21) = f1(β21) so that f1(β21) = f2(β21) > fBC(β21) since we have f1(β21), fBC(β21) > 0. This proves the other case so that (2.85) holds.

We are now ready to derive . From (2.82a), (2.82c), and (2.82e) we have I1 f (β) min f (β), f (β), f (β) for β [β , ) [β ,β ] [β , ). 1 ≤ { Σ BC 2 } ∈ Σ1 ∞ ∩ B1 1B ∩ 21 ∞

We now claim that [βΣ1, ) [βB1,β1B] [β21, )=[βΣ1, ) [βB1,β1B] holds. To see this we first look at the case∞ ∩ that the set on∩ the left∞ hand side∞ is empty,∩ which is equivalent to the condition that max β ,β ,β > β holds. Since we have β ,β < β , it { Σ1 B1 21} 1B B1 21 1B follows that βΣ1 > β1B has to hold so that the set on the right hand side is empty as well. On the other hand, if we have β β both sets are non-empty. Then both sets are equal Σ1 ≤ 1B if we have max β ,β ,β = max β ,β , which is equivalent to the condition that { Σ1 B1 21} { Σ1 B1} β max β ,β holds. We will prove the last condition by contradiction. Therefore, 21 ≤ { Σ1 B1} let us assume that β > max β ,β is true. This is equivalent to the condition that 21 { Σ1 B1} β21 >βΣ1 and β21 >βB1 holds simultaneously. Since we have β21 <β1B, it follows from (2.82a) that f1(β21) < fΣ(β21) and from (2.82c) that f1(β21) < fBC(β21). Both together gives us f (β ) < min f (β ), f (β ) which is a contradiction to (2.85). Accordingly, 1 21 { Σ 21 BC 21 } the set = [β , 1] [β ,β ] denotes the set of feasible β [0, 1] where the minimum I1 Σ1 ∩ B1 1B ∈ of (2.81) is equal to f1(β). Similarly, from (2.82b), (2.82d), and (2.82e) we have

f (β) min f (β), f (β), f (β) for β ( ,β ] [β ,β ] ( ,β ]. 2 ≤ { Σ BC 1 } ∈ −∞ 2Σ ∩ B2 2B ∩ −∞ 21

128 2.8 Appendix: Proofs

We now claim that ( ,β2Σ] [βB2,β2B] ( ,β21] = ( ,β2Σ] [βB2,β2B] holds. As before, we first look−∞ at the case∩ that the set∩ on−∞ the left hand side−∞ is empty,∩ which is equivalent to the condition that min β ,β ,β < β holds. Since we have β ,β > β , it { 2Σ 2B 21} B2 2B 21 B2 follows that β2Σ < βB2 has to hold so that the right hand side is empty as well. On the other hand, if we have β β both sets are non-empty. Then both sets are equal if we 2Σ ≥ B2 have min β ,β ,β = min β ,β , which is equivalent to the condition that β { 2Σ 2B 21} { 2Σ 2B} 21 ≥ min β ,β holds. Again, we will prove the last condition by contradiction. Therefore, { 2Σ 2B} let us assume that β < min β ,β is true. This is equivalent to the condition that 21 { Σ1 B1} β21 <βΣ1 and β21 <βB1 holds simultaneously. Since we have β21 >βB2, if follows from (2.82b) that f2(β21) < fΣ(β21) and from (2.82c) that f2(β21) < fBC(β21). Both together gives us f (β ) < min f (β ), f (β ) which is a contradiction to (2.85). Accordingly, 2 21 { Σ 21 BC 21 } the set = [0,β ] [β ,β ] denotes the set of feasible β [0, 1] where the minimum I2 2Σ ∩ B2 2B ∈ of (2.81) is equal to f2(β).

The MAC sum-rate constraint is only active if the concave parabola fBC(β) intersects fΣ(β). This is the case if and only if we have β⋆2 ∆β. Then the corresponding intersection ≥ points are characterized by β and β as in the theorem so that we have f (β) f (β) BΣ ΣB Σ ≤ BC if β [β ,β ]. Furthermore, from (2.82a) and (2.82b) we know that ∈ BΣ ΣB f (β) < min f (β), f (β) for β ( ,β ) (β , ) Σ { 1 2 } ∈ −∞ Σ1 ∩ 2Σ ∞ so that for feasible β as in the theorem the minimum of (2.81) is equal to f (β). ∈ IΣ Σ Finally, for all other feasible power distributions β = [0, 1] ( ) we have ∈ IBC \ I1 ∪ I2 ∪ IΣ f (β) min f (β), f (β), f (β) and therefore the BC phase is more restrictive than any BC ≤ { 1 2 Σ } restriction of the MAC phase.

2.8.4 Proof of Corollary 2.7

For the proof of the corollary we use the definitions of the proof of Theorem 2.5. Accord- ingly, the right plot in Figure 2.22 is a helpful illustration.

A rate pair [RM , RM ] with the sum-rate RMAC can be supported in the BC phase 1 2 ∈ CMAC Σ iff the set is non-empty. If one solves (β⋆)2 = ∆β for γ we get γ⋆ as given in the IΣ R R corollary. It follows that for = we have to have (β⋆)2 ∆β so that it is necessary that IΣ 6 ∅ ≥ γ γ⋆ . R ≥ R Since BC increases with increasing γR for the minimal γR the set Σ has to be a singleton, R Σ I this means that for γ MAC we have max β ,β = min β ,β . This is equivalent R { 2Σ BΣ} { Σ1 ΣB} to the conditions

β β β β β β β β , (2.86) 2Σ ≤ ΣB ∧ BΣ ≤ Σ1 ∧ BΣ ≤ ΣB ∧ 2Σ ≤ Σ1

129 2 Bidirectional Relay Communication using Superposition Encoding

⋆ where we have at least one equality. Since we require γR γR the condition βBΣ βΣB is already fulfilled. ≥ ≤

⋆ Next, we consider the case βBΣ βΣ1, which is equivalent to the condition β βΣ1 2 ≤ 2 − ≤ β⋆ ∆β. Since we already require γ γ⋆ we have β⋆ ∆β 0 so that the condition − R ≥ R − ≥ is fulfilled if β⋆ β 0 holds, which is easily seen the case if we have γ γˆΣ1. On the p − Σ1 ≤ R ≥ R other hand, if β⋆ >β we have β β if we have γ γΣ1(1/2). Both together gives Σ1 BΣ ≤ Σ1 R ≥ R us that β β is fulfilled if we have γ min γˆΣ1,γΣ1(1/2) . BΣ ≤ Σ1 R ≥ { R R } ⋆ ⋆2 Similarly, the case β2Σ βΣB is equivalent to the condition β2Σ β β ∆β. Since 2 ≤ − ≤ − we have β⋆ ∆β 0 the condition is fulfilled if β β⋆ 0 holds, which is the case if we − ≥ 2Σ − ≤ p have γ γˆ2Σ. On the hand, if β⋆ > β we have β β if we have γ γ2Σ(1/2). R ≥ R 2Σ 2Σ ≤ ΣB R ≥ R Both together gives us that β β is fulfilled if we have γ min γˆ2Σ,γ2Σ(1/2) . 2Σ ≤ ΣB R ≥ { R R } Finally, we prove by contradiction that the following holds

β β β β β β β β . 2Σ ≤ ΣB ∧ BΣ ≤ Σ1 ∧ BΣ ≤ ΣB ⇒ 2Σ ≤ Σ1

Therefore, let us assume that we have β2Σ >βΣ1. Then using the first and second inequality gives us βΣB β2Σ > βΣ1 βBΣ which is a contradiction to the inequality βBΣ βΣB. Accordingly, the≥ minimum necessary≥ relay power has to satisfy the first three conditions≤ of (2.86) and therefore is given by (2.16).

2.8.5 Proof of Corollary 2.8

For the proof of the corollary we use the definitions of the proof of Theorem 2.5. Accord- ingly, the left plot in Figure 2.22 is a helpful illustration. We prove the corollary by further investigation of the combinatorial structure of the geometry of f1, f2, and fBC. Therefore, let us define the function r(β) := min f (β), f (β), f (β) . { 1 2 BC } Since we assume γ < γΣMAC , we have r(β) < f (β) for all β [0, 1]. Remember R R Σ ∈ that f1(β) and f2(β) are strictly decreasing and increasing. Furthermore, since fBC(β) is a concave parabola which has its vertex at β⋆, it is strictly increasing for β<β⋆ and strictly decreasing for β>β⋆. Therefore, the sum-rate maximum is given by the combinatoric of ⋆ the vertex of the parabola at β and the intersection points at βB1 and β2B.

Since we have = , β > 1, and β < 0, the set of feasible power distributions where IΣ ∅ 1B B1 fBC(β) < r(β) is given by

= [0, 1] = [0, 1] (β ,β ). IB \ I1 ∪ I2 ∩ 2B B1 

130 2.8 Appendix: Proofs

⋆ ⋆ Since fBC(β) is a concave parabola, we have fBC(β ) = r(β ) r(β) for all β [0, 1]. Accordingly, if we have ≥ ∈

β⋆ β⋆ 0 β⋆ 1 β⋆ >β β⋆ <β , (2.87) ∈ IB ⇔ ≥ ∧ ≤ ∧ 2B ∧ B1

1 ⋆ then the sum-rate maximum is given by 2 RBC(β ). If we solve the conditions in (2.87) for γR we get

⋆ 1 1 1 1 † 1 1 β = + 2 2 0 γR γ = 2 2 , 2 2γR |h1| − |h2| ≥ ⇔ ≥ R |h2| − |h1| ⋆ 1 1 1 1 † 1 1 β = + 2 2  1 γR γ = 2 2 , 2 2γR |h1| − |h2| ≤ ⇔ ≥− R |h1| − |h2| 2 2 ⋆ γ2|h2| ⋆1 2γ2|h2| 1 1 β >β 2B = 1  2 γR <γR = 2 + 2 2 , − γR|h1| ⇔ |h1| |h1| − |h2| 2 2 ⋆ γ1|h1| 2⋆ 2γ1|h1| 1 1 β <βB1 = 2 γR <γR = 2 + 2 2 . γR|h2| ⇔ |h2| |h2| − |h1|

Therefore, we have β⋆ with the sum-rate optimum 1 R (β⋆) if we have γ† <γ < ∈ IB 2 BC | R| R min γ⋆1,γ2⋆ , which proves the case (2.18c). { R R } If we have β⋆ max β , 0 , then f (β) is decreasing for all β . Since f (β) and ≤ { 2B } BC ∈ IB 2 f (β) are strictly increasing and decreasing, the rate pair 1 R (max β , 0 ) is sum-rate 1 2 BC { 2B } optimal. Then the sum-rate optimal rate pair is on the R2-axis if we additionally have

2 2B γ2|h2| β2B 0 γR γ = 2 . ≤ ⇔ ≤ R |h1|

Then it follows that for 1 R (0) to be sum-rate optimal we require β 0 and β⋆ 0, 2 BC 2B ≤ ≤ which is equivalent to γ min γ† ,γ2B . This proves the case (2.18a). Accordingly, if R ≤ { R R } we have β > 0 and β⋆ β the rate pair 1 R (β ) is sum-rate optimal. This is case 2B ≤ 2B 2 BC 2B if γ >γ2B and γ γ⋆1, which proves the case (2.18b). R R R ≥ R Similarly, if we have β⋆ min β , 1 , then f (β) is increasing for all β . Again, ≥ { B1 } BC ∈ IB since f (β) and f (β) are strictly increasing and decreasing the rate pair 1 R (min β , 1 ) 2 1 2 BC { B1 } is sum-rate optimal. Then the sum-rate optimal rate pair is on the R1-axis if we additionally have 2 B1 γ1|h1| βB1 1 γR γ = 2 . ≥ ⇔ ≤ R |h2| Then it follows that for 1 R (1) to be sum-rate optimal we require β 1 and β⋆ 1, 2 BC B1 ≥ ≥ which is equivalent to γ min γ† ,γB1 . This proves the case (2.18e). Accordingly, if R ≤ {− R R } we have β < 1 and β⋆ the rate pair 1 R (β ) is sum-rate optimal. This is case if B1 ≥ 2 BC B1 γ >γB1 and γ γ2⋆, which proves the case (2.18d). R R R ≥ R

131 2 Bidirectional Relay Communication using Superposition Encoding

2.8.6 Proof of Theorem 2.10

We first separate a simple calculation in the following lemma, which also justifies ϑ(β).

Lemma 2.56. The normal angle of the supporting hyperplane of the rate region RBC for a relay power distribution β1 = 1 β2 = β is given by ϕ(β) = tan ϑ(β) = 2 2 |h2| (1+(1−β)γR|h1| ) − tan 2 2 . |h1| (1+βγR|h2| )

Proof of Lemma 2.56. The normal vector of the parametrized boundary −→ −→ [RR2(β), RR1(1 ′ ′ − [−R−→(β),R−→(β)] dR−→(1−β) 2 is given by R1 R2 with ′ R1 −γR|h1| and β)] ||[R−→(β),R−→(1−β)]|| R−→(β) = d β = 1+γ (1−β)|h |2 R2 R1 R1 R 1 ′ dR−→(β) 2 R−→(β) ′ R2 γR|h2| R2 R−→(β)= = 2 . Thus the angle ϕ(β) is given by tan ′ . d β 1+γRβ|h2| −R−→(β) R2 R1

Proof of Theorem 2.10. The weighted rate sum maximum in Theorem 2.10 is given by the boundary rate pair of where the angle of the normal vector of the supporting hyper- RBReq plane is equal to the angle of the weight vector, i.e. tan q2/q1. Furthermore, two restrictions apply simultaneously at boundary intersection rate pairs. Those rate pairs are also optimal for weight vectors with an angle inbetween the angles of the normal vectors of the restric- tions at this rate pair. Since for all weight vectors with non-negative elements, i.e. angles inbetween [0, π/2], the tan is a strictly increasing function. For that reason, we prefer to characterize the different cases by the argument of the tan. From Theorem 2.5 and its corol- laries we know the combinatorial structure of the rate region and its boundary. Therefore, in 2 the following we determine for any weight vector q Ê 0 the corresponding boundary ∈ + \{ } rate pair.

First we characterize all intersection rate pairs. If = β > 1, the MAC single user I1 ∅ ⇔ B1 bound 1 −→ is not achievable in the BC phase, therefore the boundary rate pair 1 R is 2 R1R 2 BC(1) optimal for all weight vectors ϑ(1) > q /q . Similarly, (2.20b) follows from = . The 2 1 I2 ∅ MAC single user bound 1 −→ is active for some weight vectors q if . 2 R1R 1 = βB1 1 I 6 ∅1 ⇔ ≤ Next we have to distinguish if γR is large enough so that the MAC vertex 2 νΣ1 can be reached, i.e. β β . Then 1 ν is optimal for all weight vectors with q /q 1. If Σ1 ≥ B1 2 Σ1 2 1 ≤ the vertex ν cannot be supported but the MAC single user bound 1 −→ βΣ1 < βB1 1 Σ1 2 R1R ≤ 1 is active for β>βB1. Therefore, the intersection rate pair 2 RBC(βB1) is optimal for weight 1 vectors q2/q1 ϑ(βB1). Similarly, if β2Σ β2B the vertex 2 ν2Σ is optimal for q2/q1 1 and the case (2.20f)≤ if not. ≤ ≥

1 Finally, two possible intersection rate pairs of the MAC sum-rate 2 RΣ with BC are left. ⋆2 R For both it is necessary that β > ∆β. If β2Σ < βBΣ < βΣ1, i.e. the MAC vertex 1 1 2 ν2Σ cannot be supported, the intersection rate pair 2 RBC(βBΣ) is optimal for all weight vectors with ϑ(β ) q /q 1. On the other hand, the MAC vertex 1 ν cannot be BΣ ≤ 2 1 ≤ 2 Σ1

132 2.8 Appendix: Proofs

1 supported if β2Σ < βΣB < βΣ1. Therefore 2 RBC(βΣB) is optimal for weight vectors with ϑ(β ) q /q 1. ΣB ≥ 2 1 ≥ For all other weight vectors BReq is bounded by the rate region of the BC phase. Therefore, 1 R the optimal rate vector 2 RBC(βBC) is given by the boundary rate pair with the corresponding normal vector, where the optimal power distribution βBC follows if one solves ϑ(βBC) = q2/q1 for βBC.

2.8.7 Proof of Lemma 2.11

Since for any α a power distribution [β ,β ] with αRM (1 α)R−→(β ) and ∈ A 1 2 ∈ B 1 ≤ − R2 1 αRM (1 α)R−→(β ) exists, it is possible for the relay node to broadcast the messages 2 ≤ − R1 2 from nodes 1 and 2 with rates αRM and αRM . Accordingly, for any α we achieve 1 2 ∈ A the bidirectional rate pair [R , R ]= α[RM , RM ] so that the largest α∗ maximizes the 1 2 1 2 ∈A bidirectional rate pair in each component. Next we prove by contradiction that α∗ is uniquely characterized by (2.23a) and (2.23b). Therefore, we need that −→ and −→ are RR2(β1) RR1(β2) continuous and increasing in β1 and β2. Let us assume that for the largest element α∗ of the set at least one equality is not fulfilled. A Since α∗ , a relay power distribution [β ,β ] exists so that either α∗RM < (1 ∈ A 1 2 ∈ B 1 − α∗)R−→(β ) or α∗RM < (1 α∗)R−→(β ). R2 1 2 − R1 2 If α∗RM < (1 α∗)R−→(β ), we can find a β˜ <β where still α∗RM < (1 α∗)R−→(β˜ ) 1 − R2 1 1 1 1 − R2 1 holds. With β˜ = 1 β˜ > β we get α∗RM < (1 α∗)R−→(β˜ ). Since in both cases we 2 − 1 2 2 − R1 2 have a strict inequality, we can find an α˜ > α∗ while both inequalities are still fulfilled, this means α˜ . This contradicts the assumption that α∗ is the largest element in . ∈A A Accordingly, if α∗RM < (1 α∗)R−→(β ), we can find a β˜ <β and a β˜ = 1 β˜ >β so 2 − R1 2 2 2 1 − 2 1 that we have α∗RM < (1 α∗)R−→(β˜ ) and α∗RM < (1 α∗)R−→(β˜ ). This allows us to 1 − R2 1 2 − R1 2 increase α while both inequalities are still fulfilled, what again contradicts the assumption.

Finally, we assume that for the largest element α∗ of the set we have β + β < 1. A 1 2 Therefore, we can find β˜ > β and β˜ > β with [β˜ , β˜ ] so that we have α∗RM < 1 1 2 2 1 2 ∈ A 1 (1 α∗)R−→(β˜ ) and α∗RM < (1 α∗)R−→(β˜ ). This allows us to increase α while both − R2 1 2 − R1 2 inequalities are still fulfilled, which contradicts the assumption β1 + β2 < 1.

2.8.8 Proof of Theorem 2.12

M M The equivalent description follows from a transformation of rate pairs [R1 , R2 ] on the boundary of the MAC rate region using Lemma 2.11. We get the sets , , and with R1 R2 RΣ

133 2 Bidirectional Relay Communication using Superposition Encoding

⋆ ⋆ ⋆ ⋆ time division parameters α1(β), α2(β), and αΣ(β) if we solve (2.23a) and (2.23b) for α with M −→, M −→, and M M MAC respectively. R1 = R1R R2 = R2R R1 + R2 = RΣ

For an arbitrary rate pair R we will show in the following that R ∈ R1 ∩R2 ∩RΣ ∈ RBRopt holds. Since R has to be within there exists β˜ [0, 1] so that R R (β˜ ) = R1 1 ∈ 1 ≤ 11 1 1 α⋆(β˜ ) R−→(β˜ ) and R R (β˜ )= 1 α⋆(β˜ ) R−→(1 β˜ ) hold. This means that − 1 1 R2 1 2 ≤ 12 1 − 1 1 R1 − 1 we have R 1 α⋆(β˜ ) . Similarly, from R and R we know that there ∈ − 1 1 RBC ∈ R2 ∈ RΣ exist β˜ , β˜ [0, 1] so that we have R 1 α⋆(β˜ ) and R 1 α⋆ (β˜ ) 2 Σ ∈  ∈ − 2 2 RBC ∈ − Σ Σ RBC respectively. With α˜ = max α⋆(β˜ ), α⋆(β˜ ), α⋆ (β˜ ) we still have R (1 α˜) . { 1 1 2 2 Σ Σ } ∈ − RBC Furthermore, we see from

R R (β˜ )= α⋆(β˜ )R−→ αR˜ −→, 1 ≤ 11 1 1 1 1R ≤ 1R R R (β˜ )= α⋆(β˜ )R−→ αR˜ −→, 2 ≤ 22 2 2 2 2R ≤ 2R R + R R (β˜ )+ R (β˜ )= α⋆ (β˜ )RMAC αR˜ MAC 1 2 ≤ Σ1 Σ Σ2 Σ Σ Σ Σ ≤ Σ that we have R α˜ . It follows that R (˜α) so that we conclude ∈ CMAC ∈ RBRopt ⊆ RBRopt that . R1 ∩ R2 ∩ RΣ ⊆ RBRopt For the reverse inclusion we show that for any rate pair R we also have R ∈ RBRopt ∈ R1 ∩ . For any R there exists an α˜ [0, 1] so that R α˜ (1 α˜) R2 ∩RΣ ∈ RBRopt ∈ ∈ CMAC ∩ − RBC holds. From R α˜ it follows that R αR˜ −→, R αR˜ −→, and R +R αR˜ MAC, ∈ CMAC 1 ≤ 1R 2 ≤ 2R 1 2 ≤ Σ R−→−R1 R−→−R2 RMAC−R −R which is equivalent to (1 α˜) 1R , (1 α˜) 2R , and (1 α˜) Σ 1 2 R−→ R−→ RMAC − ≥ 1R − ≥ 2R − ≥ Σ respectively. Likewise, from (1 α˜) BC we know that there exists a β˜ [0, 1] where we − R ∈ R−→−R1 have R (1 α˜)R−→(β˜) and R (1 α˜)R−→(1 β˜). If we solve (1 α˜) 1R and 1 R2 2 R1 R−→ ≤ − ≤ − − − ≥ 1R R−→R−→(β˜) 1R R2 ⋆ R1 (1 α˜)R−→(β˜) for R1 we get R1 = 1 α (β˜) R−→(β˜) = R11(β˜). R2 R−→+R−→(β˜) 1 R2 ≤ − ≤ 1R R2 − We can use the previous inequalities to bound R2 as follows 

−→ ˜ R1R R1 R11(β) R2 (1 α˜)R−→(1 β˜)= − R−→(1 β˜) 1 R−→(1 β˜)= R12(β˜). ≤ − R1 − R−→ R1 − ≤ − R−→ R1 − 1R  1R 

R−→−R2 RMAC−R −R It follows that R . If we use (1 α˜) 2R and (1 α˜) Σ 1 2 we 1 R−→ RMAC ∈ R − ≥ 2R − ≥ Σ can similarly conclude with R (1 α˜)R−→(β˜) and R (1 α˜)R−→(1 β˜) that 1 ≤ − R2 2 ≤ − R1 − R R (β˜) and R R (β˜) so that R and that R R (β˜) and R R (β˜) 1 ≤ 21 2 ≤ 22 ∈ R2 1 ≤ Σ1 2 ≤ Σ2 so that R respectively. This means that we have R from which we ∈ RΣ ∈ R1 ∩ R2 ∩ RΣ conclude that holds. Hence, we proved the equality = RBRopt ⊆ R1 ∩ R2 ∩ RΣ RBRopt . R1 ∩ R2 ∩ RΣ

134 2.8 Appendix: Proofs

2.8.9 Proof of Corollary 2.13

For the proof of the results we basically look at the derivatives of some rate functions. For notational simplicity we omit the arguments; but we note the subtle particularities, which however do not change the main results.

′ ′ ′′ ′′ For a specific but arbitrary β [0, 1], let R−→, R−→, R−→, R−→, R−→, and R−→ denote R−→(β) ∈ R1 R2 R1 R2 R1 R2 R1 and −→ and its first and second derivatives with respect to . It can be easily seen RR2(1 β) β − ′ ′ ′′ ′′ that we have R−→, R−→, R−→ > 0 and R−→, R−→, R−→ < 0 for all β [0, 1] except for R1 R2 R2 R1 R1 R2 ∈ , where we have −→ , and for , where we have −→ . Later, we will still β = 0 RR2 = 0 β = 1 RR1 = 0 achieve strict monotony since we never have equality for both simultaneously.

From this we get the inequalities for the first derivatives

2 ′ dR (β) R−→R−→ 11 = 1R R2 0, −→ −→ 2 dβ (R1R + RR2) ≥ ′ ′ dR (β) R−→(R−→(R−→ + R−→) R−→R−→) 21 = 2R R2 2R R1 − R2 R1 > 0, −→ −→ 2 dβ (R2R + RR1) MAC ′ MAC ′ dR (β) RΣ (R−→(RΣ + R−→) R−→R−→)) Σ1 = R2 R1 − R2 R1 > 0. dβ MAC −→ −→ 2 (RΣ + RR1 + RR2)

Therefore, R11(β) is increasing and R21(β) and RΣ1(β) are strictly increasing with β. Ac- cordingly, from

′ ′ dR (β) R−→(R−→(R−→ + R−→) R−→R−→) 12 = 1R R1 1R R2 − R1 R2 < 0, −→ −→ 2 dβ (R1R + RR2) 2 ′ dR (β) R−→R−→ 22 = 2R R1 0, −→ −→ 2 dβ (R2R + RR1) ≤ MAC ′ MAC ′ dR (β) RΣ (R−→(RΣ + R−→) R−→R−→)) Σ2 = R1 R2 − R1 R2 < 0 dβ MAC −→ −→ 2 (RΣ + RR1 + RR2) we see that R22(β) is decreasing and R12(β) and RΣ2(β) are strictly decreasing with β. Therefore, the functions R1(β), R2(β), and RΣ(β) are parameterizations of the boundaries of , , and in the first quadrant. R1 R2 RΣ The normalized normal vector for the parametrized curve R (β) is given by 1 − dR12(β) , dR11(β) R (β) with the angle ϕ (β) = arctan q (β) where q (β) = dβ dβ || 1 || 1 − 1 1  dR11(β) dR12(β) dβ dβ . Since both components of the normal vector are nonnegative, the function 

135 2 Bidirectional Relay Communication using Superposition Encoding

′′ ′ ′′ ′ ϕ1 has a range [0, π/2]. Since R−→R−→ R−→R−→ > 0 for all β [0, 1] the derivative R2 R1 − R1 R2 ∈ ′′ ′ ′′ ′ R−→(R−→R−→ R−→R−→)(R−→ + R−→) dq1(β) 1R R2 R1 − R1 R2 1R R2 = ′ ′ 2 dβ ((R−→(R−→ + R−→) R−→R−→)) R1 1R R2 − R1 R2 is positive. Since arctan is strictly increasing, it follows that ϕ1(β) is strictly decreasing. Since R11(β) is increasing and R12(β) and ϕ1(β) are strictly decreasing it follows that 1 is convex. R

Similarly, we get the angles ϕ2(β) = arctan q2(β) and ϕΣ(β) = arctan qΣ(β) with dR21(β) dR22(β) dRΣ1(β)−dRΣ2(β) − q2(β)= dβ dβ and qΣ(β)= dβ dβ for the normal vectors of rate pairs on the parametrized curves R (β) and R (β) respectively. Again, ϕ (β) and ϕ (β) are  2 Σ  2 Σ strictly decreasing for all β since the derivatives

′′ ′ ′′ ′ R−→(R−→R−→ R−→R−→)(R−→ + R−→) dq2(β) 2R R2 R1 − R1 R2 2R R1 = ′ ′ 2 , dβ ((R−→(R−→ + R−→) R−→R−→)) R2 2R R1 − R2 R1 MAC ′′ ′ ′′ ′ MAC dq (β) RΣ (R−→R−→ R−→R−→)(RΣ + R−→ + R−→) Σ = R2 R1 − R1 R2 R2 R1 ′ MAC ′ 2 dβ ((R−→(R + R−→) R−→R−→)) R1 Σ R2 − R1 R2 are positive. Therefore, and are convex. R2 RΣ Finally, is convex since the intersection of convex sets is itself convex. RBRopt

2.8.10 Proof of Proposition 2.14

We have an intersection between R1(β) and RΣ(β) if there exist β,ˆ βˇ [0, 1] with ˆ ˆ ˇ ˇ ∈ [R11(β), R12(β)]=[RΣ1(β), RΣ2 (β)]. First we consider the case that the intersection point is not on the axes. Then from

R (βˆ) R−→(βˆ) R−→(βˇ) R (βˇ) 11 = R2 = R2 = 11 R (βˆ) R−→(1 βˆ) R−→(1 βˇ) R12(βˇ) 12 R1 − R1 − and the fact that R−→(β) and R−→(1 β) are strictly increasing and decreasing in β we R2 R1 − ˆ ˇ ⋆ ⋆ conclude that for an intersection point we have β = β. Since α1(β), αΣ(β) < 1 holds for any , for an intersection point on the axes we either need −→ ˆ −→ ˇ or β RR2(β) = RR2(β) = 0 R−→(1 βˆ) = R−→(1 βˇ) = 0 so that we have either βˆ = βˇ = 0 or βˆ = βˇ = 1. It R1 − R1 − follows that for an intersection point between R1(β) and RΣ(β) we always have βˆ = βˇ. The same arguments apply for an intersection point between R2(β) and RΣ(β) and R1(β) and R2(β).

136 2.8 Appendix: Proofs

Accordingly, we have an intersection point between R1(β) and RΣ(β) iff there exists a β [0, 1] with R (β ) = R (β ) and R (β ) = R (β ). This is fulfilled iff 1Σ ∈ 11 1Σ 1Σ 1Σ 21 1Σ 2Σ 1Σ we have −→ MAC R1R RΣ = MAC , R−→ + R−→(β1Σ) R + R−→(1 β )+ R−→(β ) 1R R2 Σ R1 − 1Σ R2 1Σ R−→ R−→(β ) 1R R2 1Σ which is equivalent to the equation MAC = . Since this is exactly equation R −R−→ R−→(1−β1Σ) Σ 1R R1 (2.24) we see that β1Σ corresponds to the unique optimal relay power distribution of the MAC rate pair [RM , RM ]=[R−→, RMAC R−→]= ν , cf. (2.5a). 1 2 1R Σ − 1R 1Σ ∈ CMAC

With similar arguments we see that the unique intersection between R1(β) and RΣ(β) at β [0, 1] corresponds to [RM , RM ]=[RMAC R−→, R−→]= ν . Σ2 ∈ 1 2 Σ − 2R 2R Σ2 ∈ CMAC Finally, we have an intersection of R (β) and R (β) iff there exists a β [0, 1] with 1 2 12 ∈ R11(β12)= R12(β12) and R11(β12)= R12(β12). This is fulfilled iff we have

R−→ R−→ 1R = 2R , R−→ + R−→(β ) R−→ + R−→(1 β )+ R−→(β ) 1R R2 12 2R R1 − 12 R2 12

R−→ R−→(β ) which is equivalent to the equation 1R R2 12 . Let us assume that the rate pair R−→ = R−→(1−β ) 2R R1 12 R (β ) . From Lemma 2.11 we know that [R−→, R−→] is the corresponding rate 1 12 ∈ RBRopt 1R 2R pair in the MAC phase. But since −→ −→ MAC, this rate pair is not achievable so R1R + R2R > RΣ that we have R (β ) / . 1 12 ∈ RBRopt The inequalities (2.28a) and (2.28b) follow after simple calculations using the relations 1 1 + 1 1 + 1 and 1 1 + 1 1 + R−→(1) RMAC R−→(1) R−→ R−→(1) R−→(1) RMAC R−→(1) R−→ R2 ≤ Σ R2 ≤ 1R R2 R1 ≤ Σ R1 ≤ 2R 1 . R−→(1) R1

2.8.11 Proof of Corollary 2.15

Since is given by the intersection (2.25), the boundary is characterized by the rate RBRopt pairs on the boundaries of , , and which are most restrictive. For β = 0 we have R1 R2 RΣ R−→(0) = 0 R (0) = R (0) = R (0) = 0. From (2.28b) we see that the rate pair R2 ⇒ 11 21 Σ1 R2(0) is most restrictive for rate pairs on the ordinate [0, R2]. For small β > 0 the boundary R2(β) is still most restrictive until RΣ(β) intersects the boundary at βΣ2. Until the next intersection, the boundary RΣ(β) is most restrictive, i.e. for β1Σ <β<βΣ2. And finally, for the last section R (β) with β β is most restrictive. 1 ≥ 1Σ

137 2 Bidirectional Relay Communication using Superposition Encoding

2.8.12 Proof of Theorem 2.16

For a convex set it is well-known that the weighted rate sum is attained at the boundary rate pair where the direction of the normal vector is equal to the direction of the weight vector. This can be easily seen by the following geometrical interpretation. Consider a hyperplane 2 in Ê with a normal vector q which intersects the feasible set . Due to orthogonality, RBRopt any rate pair of this intersection leads to the same weighted rate sum. In order to maximize the weighted rate sum we have to shift the hyperplane in the direction of the normal vector as far as possible until the hyperplane is finally tangential to the boundary of BRopt. Such a tangential hyperplane is called a supporting hyperplane. The rate pair whereR the supporting hyperplane with normal vector q intersects the boundary is the rate pair with the largest weighted rate sum for this weight vector.

Accordingly, the procedure to find the optimum is obvious. First we have to find the opti- mal relay power distribution β∗ corresponding to the weight vector q. Therefore, we have to find the rate pair on the boundary where the angle of the normal vector is equal to the angle of the weight vector, i.e. θq. Since the boundary is defined section-wise, we have to distinguish between the following cases: If θq [ϕ (1),ϕ (β )], the optimal rate pair ∈ 1 1 1Σ is on the boundary of 1. Therefore, for those angles we can calculate the optimal relay R −1 power distribution using the inverse function ϕ . Similarly, if θq [ϕ (β ),ϕ (β )] or 1 ∈ Σ 1Σ Σ Σ2 θq [ϕ (β ),ϕ (0)] the optimal rate pair is on the boundary of or respectively. For ∈ 2 Σ2 2 RΣ R2 weight vectors with an angle θq [0,ϕ (1)), (ϕ (β ),ϕ (β )), (ϕ (β ),ϕ (β )), or ∈ 1 1 1Σ Σ 1Σ Σ Σ2 2 Σ2 (ϕ2(0), π/2), the rate pairs R1(1), RΣ(β1Σ), RΣ(βΣ2), or R2(0) at the intersections of ∗ R1(β), RΣ(β), and R2(β) with β = 1, β1Σ, βΣ2, or 0 respectively are optimal. This char- ∗ ∗ acterizes the optimal rate pair on the boundary Ropt(β (q)) and the corresponding optimal ∗ 2 time division parameter α (q) for any weight vector q Ê 0 . ∈ + \ { }

2.8.13 Proof of Lemma 2.17

x From [AS64, 4.1.33] we have 1+x < ln(1 + x) for x> 1,x = 0. Therewith, we get for a a/x − 6 constant a > 0 the inequality ln(1 + a/x) > 1+a/x , for x > 0. We can use this inequality

138 2.8 Appendix: Proofs to see that the first derivatives

2 ˜−→ 2 γ1|h1| dR1R(α) 1 γ1 h1 α = ln 1+ | | 2 > 0 dα ln(2) α − γ1|h1|   1+ α ! 2 ˜−→ 2 γ2|h2| dR2R(α) 1 γ2 h2 α = ln 1+ | | 2 > 0 dα ln(2) α − γ2|h2|   1+ α ! 2 2 ˜MAC 2 2 γ1|h1| +γ2|h2| dRΣ (α) 1 γ1 h1 + γ2 h2 α = ln 1+ | | | | 2 2 > 0 dα ln(2) α − γ1|h1| +γ2|h2|   1+ α ! are positive so that R˜−→(α), R˜−→(α), and R˜MAC(α) are strictly increasing for α (0, 1). 1R 2R Σ ∈ The second derivatives of ˜−→ , ˜−→ , and ˜MAC are given by R1R(α) R2R(α) RΣ (α)

2 ˜ 2 2 d R−→(α) γ1 h1 1R = | | 0 2 2 2 dα − 3 γ1|h1| ≤ α 1+ α  ln(2) 2 ˜  2 2 d R−→(α) γ2 h2 2R = | | 0 2 2 2 dα − 3 γ2|h2| ≤ α 1+ α  ln(2) 2 MAC  2  2 2 d R˜ (α) γ1 h1 + γ2 h2 Σ = | | | | 0. 2 2 2 2 dα − 3 γ1|h1| +γ2|h2| ≤ α 1+ α  ln(2)   Since R˜−→(α), R˜−→(α), and R˜MAC(α) are non-positive for all α (0, 1) it follows that they 1R 2R Σ ∈ are concave.

2.8.14 Proof of Lemma 2.18

x From [AS64, 4.1.33] we have 1+x < ln(1 + x) for x > 1,x = 0. Therewith, we get a − 6 a 1−x for a constant a > 0 the inequality ln(1 + 1−x ) > 1+ a , for x [0, 1). We can use this 1−x ∈ inequality to see that for an arbitrary but fixed β the first partial derivatives with respect to α

γ |h |2β ˜−→ R 2 2 ∂RR2(α,β) 1 1−α γR h2 β = 2 ln 1+ | | < 0 ∂α ln(2) γR|h2| β − 1 α 1+ 1−α  − ! γ |h |2(1−β) ˜−→ R 1 2 ∂RR1(α,β) 1 1−α γR h1 (1 β) = 2 ln 1+ | | − < 0 ∂α ln(2) γR|h1| (1−β) − 1 α 1+ 1−α  − !

139 2 Bidirectional Relay Communication using Superposition Encoding are negative so that R˜−→(α,β) is strictly decreasing for α (0, 1]. The Hessian matrix of R2 ∈ R˜−→ for α (0, 1] and β [0, 1] can be easily calculated as follows R2 ∈ ∈

∂2R˜−→ ∂2R˜−→ 2 R2 R2 2 2 β β γR h2 3 2 ˜−→ ∂α∂α ∂α ∂β (1−α) (1−α) H(R )= 2 ˜ 2 ˜ = − | 2 | . R2 ∂ R−→ ∂ R−→ γRβ|h2| 2 β 1  R2 R2  1+ ln(2) 2 ∂β∂α ∂β ∂β 1−α  " (1−α) (1−α) #    2 From ˜−→ H ˜−→ it follows that at least one eigenvalue i=1 λi(RR2) = det (RR2) = 0 2 ˜−→ , is zero. Furthermore, from ˜−→ H ˜−→ λi(RR2Q) i = 1, 2 i=1 λi(RR2) = tr (RR2) = 2 2 2 2 −(γR|h2| ) (β +(1−α) ) P   2 2 0 it additionally follows that the other eigenvalue is non-positive. γRβ|h2| 3 1+ 1−α ln(2)(1−α) ≤ Therefore, both eigenvalues λ (R˜−→), i = 1, 2, are non-positive so that the rate function  i R2 R˜−→(α,β) is concave on [0, 1) [0, 1]. R2 × Similarly, the Hessian matrix of R˜−→ for α [0, 1) and β [0, 1] is given by R1 ∈ ∈

∂2R˜−→ ∂2R˜−→ 2 R1 R1 2 2 (1−β) 1−β γR h1 3 2 ˜−→ ∂α∂α ∂α ∂β (1−α) (1−α) H(R )= 2 ˜ 2 ˜ = − | |2 . R1 ∂ R−→ ∂ R−→ γR(1−β)|h1| 2 1−β 1  R1 R1  1+ ln(2) 2 ∂β∂α ∂β ∂β . 1−α  " (1−α) (1−α) #    2 2 Again from ˜−→ H ˜−→ and ˜−→ H ˜−→ i=1 λi(RR1) = det (RR1) = 0 i=1 λi(RR1) = tr (RR1) = 2 2 2 2 −(γR|h2| ) (Qβ +(1−α) )   P ˜   2 2 0 it follows that both eigenvalues λi(R−→), i = 1, 2, are non- γRβ|h2| 3 R1 1+ 1−α ln(2)(1−α) ≤ positive so that the rate function R˜−→(α,β) is concave on [0, 1) [0, 1] as well.  R1 ×

2.8.15 Proof of Proposition 2.19

For any arbitrary but fixed time-division parameter α [0, 1) and rate pairs R(1), R(2) ∈ ∈ ˜ (α) we have to show that for any t [0, 1] we have R(t) := tR(1) + (1 t)R(2) RBC ∈ − ∈ ˜ (α). Then ˜ (α) is convex. RBC RBC (1) (2) Let Ri(t) := tRi + (1 t)Ri , i = 1, 2, denote the components of R(t). For each rate − (k) pair R(k), , there exists a (k) such that we have ˜−→ (k) and k = 1, 2 β [0, 1] R1 RR2(α,β ) (k) ∈ ≤ R R˜−→(α,β(k)). For t [0, 1] we define β(t) := tβ(1) + (1 t)β(2). Then we have 2 ≤ R1 ∈ − (1) (2) R (t)= tR + (1 t)R tR˜−→(α,β(1)) + (1 t)R˜−→(α,β(2)) R˜−→(α,β(t)) 1 1 − 1 ≤ R2 − R2 ≤ R2 (1) (2) R (t)= tR + (1 t)R tR˜−→(α,β(1)) + (1 t)R˜−→(α,β(2)) R˜−→(α,β(t)) 2 2 − 2 ≤ R1 − R1 ≤ R1

140 2.8 Appendix: Proofs where the last inequalities follow from concavity of R˜−→(α,β) and R˜−→(α,β) for β [0, 1]. R2 R1 ∈ This means that for all t [0, 1] we have β(t) [0, 1] and R (t) R˜−→(α,β(t)) and ∈ ∈ 1 ≤ R2 ˜−→ so that R ˜ follows. For we have ˜ , R1(t) RR2(α,β(t)) (t) BC(α) α = 0 BC(0) = which≤ is convex by definition. ∈ R R ∅

2.8.16 Proof of Lemma 2.23

Since R˜−→(α,β) and R˜−→(α,β) are continuous, positive, and strictly decreasing for α R1 R2 ∈ [0, 1) and a fixed β the absolute value of the rate pair R˜BC(α,β) is strictly decreas- ing as well. Likewise, ˜−→ , ˜−→ , and ˜MAC are continuous, positive, and R1R(α) R2R(α) RΣ (α) strictly increasing for α (0, 1]. Furthermore, for the continuous continuation we have ∈ R˜−→(1,β) = R˜−→(1,β) = R˜−→(0) = R˜−→(0) = R˜MAC(0) = 0 for all β [0, 1]. Since R1 R2 1R 2R Σ ∈ both arguments of the minima are continuous and one is strictly increasing while the other is strictly decreasing it follows that for the maximizing time-division parameter both arguments are equal and the maximizing time-division parameter is unique.

2.8.17 Proof of Theorem 2.21

First, we will prove the inclusion ˜ ˜ ˜ ˜ . To this end we have to show R1 ∩ R2 ∩ RΣ ⊆ RBRopt that for any arbitrary rate pair R ˜ ˜ ˜ it follows that R ˜ . Let ϕR and ∈ R1 ∩ R2 ∩ RΣ ∈ RBRopt RR denote the angle and the radius of the rate pair R, i.e. the rate pair in polar coordinates is given by R = [RR cos(ϕR), RR sin(ϕR)]. If R ˜ ˜ ˜ we have R ˜ , ∈ R1 ∩ R2 ∩ RΣ ∈ R1 R ˜ , and R ˜ so that we have ∈ R2 ∈ RΣ

RR min R˜ (ϕR), R˜ (ϕR), R˜ (ϕR) . ≤ 1 2 Σ n o From Lemma 2.23 we know that for each R˜1(ϕR), R˜2(ϕR), R˜Σ(ϕR) there exist unique ∗ ∗ ∗ maximizing time-division parameters α˜ (ϕR), α˜ (ϕR), and α˜ (ϕR) [0, 1] where we 1 2 Σ ∈ have

R˜−→(˜α∗(ϕ )) ˜ ∗ 1R 1 R RBC(˜α1(ϕR),ϕR)= cos(ϕR) R˜−→(˜α∗(ϕ )) ˜ ∗ 2R 2 R RBC(˜α2(ϕR),ϕR)= sin(ϕR) ˜MAC ∗ ˜ ∗ RΣ (˜αΣ(ϕR)) RBC(˜αΣ(ϕR),ϕR)= cos(ϕR) + sin(ϕR)

∗ ∗ ∗ ∗ respectively. Let α˜ := max α˜1(ϕR), α˜2(ϕR), α˜Σ(ϕR) denote the maximum, which cor- { } ∗ ∗ responds to the shortest broadcast phase. With the power distribution β˜ := β˜BC(˜α ,ϕR),

141 2 Bidirectional Relay Communication using Superposition Encoding

∗ which is the power distribution of the rate pair on the boundary of ˜BC(˜α ) with angle ϕR, ∗ ∗ ∗ R we have RR R˜ (˜α , β˜ ) so that R ˜ (˜α ) follows. Moreover, since R˜−→(α), ≤ BC ∈ RBC 1R R˜−→(α), and R˜MAC(α) are increasing for α [0, 1] we have for the individual rate con- 2R Σ ∈ straints

R˜−→(˜α1(ϕR)) ˜ 1R ˜−→ ∗ R1 = RR cos(ϕR) R1(ϕR) cos(ϕR)= cos(ϕR) R1R(˜α ) ≤ cos(ϕR) ≤

R˜−→(˜α2(ϕR)) ˜ 2R ˜−→ ∗ R2 = RR sin(ϕR) R2(ϕR) sin(ϕR)= sin(ϕR) R2R(˜α ) ≤ sin(ϕR) ≤ and for the sum-rate constraint

R + R = RR(cos(ϕR) + sin(ϕR)) R˜ (ϕR)(cos(ϕR) + sin(ϕR)) 1 2 ≤ Σ ˜MAC RΣ (˜αΣ(ϕR)) ˜MAC ˜MAC ∗ = (cos(ϕR) + sin(ϕR)) = RΣ (˜αΣ(ϕR)) RΣ (˜α ) cos(ϕR) + sin(ϕR) ≤ so that R ˜ (˜α∗). It follows that R ˜ (˜α∗) ˜ (˜α∗) ˜ (α) ∈ CMAC ∈ RBC ∪ CMAC ⊆ α∈[0,1]RBC ∪ ˜ (α)= ˜ . CMAC RBRopt S For the reverse inclusion we show that for any R ˜BRopt it follows that R ˜1 ˜2 ∈ R ∗∈ R ∩ R ∩ ˜ . For any R = [RR cos(ϕR), RR sin(ϕR)] ˜ there exists an α˜ [0, 1] such RΣ ∈ RBRopt ∈ that R ˜ (˜α∗) and R ˜ (˜α∗). This implies that we have ∈ CMAC ∈ RBC R˜−→(˜α∗) ˜−→ ∗ 1R (2.88a) R1 = RR cos(ϕR) R1R(˜α ) RR , ≤ ⇒ ≤ cos(ϕR) R˜−→(˜α∗) ˜−→ ∗ 2R (2.88b) R2 = RR sin(ϕR) R2R(˜α ) RR , ≤ ⇒ ≤ sin(ϕR) ˜MAC ∗ ˜MAC ∗ RΣ (˜α ) R1 + R2 = RR cos(ϕR) + sin(ϕR) RΣ (˜α ) RR . ≤ ⇒ ≤ cos(ϕR) + sin(ϕR)  (2.88c)

For a given time-division α˜∗ the rate pair with largest radius with the same angle as the rate ∗ ∗ ∗ ∗ pair R has the relay power distribution β˜ := β(˜α ,ϕR). This implies ϕR = ϕBC(˜α , β˜ ). Then it follows from R ˜ (˜α) that ∈ RBC ∗ ∗ R = RR cos(ϕR) R˜−→(˜α , β˜ ), 1 ≤ R2 ∗ ∗ R = RR sin(ϕR) R˜−→(˜α , β˜ ). 2 ≤ R1 Furthermore, we have

˜−→ ∗ ˜∗ ˜−→ ∗ ˜∗ ˜−→ ∗ ∗ ˜−→ ∗ ∗ RR2(˜α , β ), RR1(˜α , β ) = RR2 α˜ ,β(˜α ,ϕR) , RR1 α˜ ,β(˜α ,ϕR) h i h ∗ ∗ i = R˜ BC(˜α ,ϕR)= R˜BC(˜α ,ϕR)[cos(ϕR), sin( ϕR)].

142 2.8 Appendix: Proofs

∗ Therefore, we have RR R˜BC(˜α ,ϕR). This together with (2.88a), (2.88b), and (2.88c) gives us ≤

˜−→ ∗ ∗ R1R(˜α ) RR min R˜BC(˜α ,ϕR), ≤ ( cos(ϕR) ) ˜−→ R1R(α) max min R˜BC(α,ϕR), = R˜1(ϕR) ≤ α∈[0,1] ( cos(ϕR))

˜−→ ∗ ∗ R2R(˜α ) RR min R˜BC(˜α ,ϕR), ≤ ( sin(ϕR) ) ˜−→ R2R(α) max min R˜BC(α,ϕR), = R˜2(ϕR) ≤ α∈[0,1] ( sin(ϕR))

˜MAC ∗ ∗ RΣ (˜α ) RR min R˜BC(˜α ,ϕR), ≤ ( cos(ϕR) + sin(ϕR)) ˜MAC RΣ (α) max min R˜BC(α,ϕR), = R˜Σ(ϕR) ≤ α∈[0,1] ( cos(ϕR) + sin(ϕR))

This let us conclude that

R1 = RR cos(ϕR) R˜1(ϕR) cos(ϕR) ≤ R =[R , R ] ˜ , ˜ 1 2 1 R2 = RR sin(ϕR) R1(ϕR) sin(ϕR) ) ⇒ ∈ R ≤

R1 = RR cos(ϕR) R˜2(ϕR) cos(ϕR) ≤ R =[R , R ] ˜ , ˜ 1 2 2 R2 = RR sin(ϕR) R2(ϕR) sin(ϕR) ) ⇒ ∈ R ≤

R1 = RR cos(ϕR) R˜Σ(ϕR) cos(ϕR) ≤ R =[R , R ] ˜ . ˜ 1 2 Σ R2 = RR sin(ϕR) RΣ(ϕR) sin(ϕR) ) ⇒ ∈ R ≤ Accordingly, we have R ˜ ˜ ˜ finally. Therewith, we have proved ˜ = ∈ R1 ∩ R2 ∩ RΣ RBRopt ˜ ˜ ˜ . R1 ∩ R2 ∩ RΣ

143 2 Bidirectional Relay Communication using Superposition Encoding

2.8.18 Proof of Theorem 2.24

We first prove (2.42a) and (2.42b). For and π we have ˜ ˜−→ ϕ = 0 ϕ = 2 RBC(α, 0) = RR2(α, 1) and ˜ π ˜−→ respectively. Therewith, we have RBC(α, 2 )= RR1(α, 0)

R˜1(0) = max min R˜−→(α, 1), R˜−→(α) , α∈[0,1] R2 1R ˜  ˜ ˜MAC RΣ(0) = max min R−→(α, 1), RΣ (α) , α∈[0,1] R2  R˜−→ (α) ˜ ˜ 2R ˜−→ ˜−→ R2(0) = lim max min RBC(α,ϕ), = max RR2(α, 1) = RR2(0, 1). ϕ→0 α∈[0,1] ( sin(φ) ) α∈[0,1]

We know that ˜−→ and ˜−→ for and ˜−→ ˜MAC RR2(1, 1) = 0 RR2(α, 1) > 0 α < 1 R1R(0) = RΣ (0) = 0 and R˜−→(α), R˜MAC(α) > 0 for α (0, 1]. It follows that the optimal time-division 1R Σ ∈ parameters are in the open interval . Since ˜−→ ˜MAC for all α˜1(0), α˜Σ(0) (0, 1) R1R(α) < RΣ (α) α (0, 1) it follows that R˜ (0) < R˜ (0). Furthermore, since R˜−→(α, 1) < R˜−→(0, 1) for ∈ 1 Σ R2 R2 ˜ ˜ π all α (0, 1) we have RΣ(0) < R2(0) so that (2.42a) follows. Similarly, for ϕ = 2 we have ∈

˜ π ˜−→ ˜−→ R2( 2 ) = max min R (α, 0), R (α) , α∈[0,1] R1 2R

˜ π  ˜−→ ˜MAC RΣ( 2 ) = max min R (α, 0), RΣ (α) , α∈[0,1] R1  R˜−→ (α) R˜ ( π )= lim max min R˜ (α,ϕ), 1R = max R˜−→(α, 0) = R˜−→(0, 0). 1 2 π BC R1 R1 α∈[0,1] cos(φ) α∈[0,1] ϕ→ 2 ( )

As before, we can conclude with R˜−→(α) R˜MAC(α) and R˜−→(α, 0) R˜−→(0, 0) for all 2R ≤ Σ R1 ≤ R2 α (0, 1) that (2.42b) holds. ∈ Since the boundaries are continuous curves in the first quadrant we see from (2.42a) and (2.42b) that boundaries of ˜1, ˜2, and ˜Σ have to intersect at least once. In the following we will see that they intersectR atR one boundaryR rate pair only.

For an intersection rate pair between the boundaries ˜1 and ˜2 there must exist an angle π ˜ R R˜ ϕ˜12 (0, 2 ) where the radii are equal, i.e. we have R1(ϕ ˜12)= R2(ϕ ˜12). From Lemma 2.23 we additionally∈ know that

R˜−→(˜α (ϕ ˜ )) ˜ ˜ ∗ 1R 1 12 R1(ϕ ˜12)= RBC(α1(ϕ ˜12), ϕ˜12)= cos(ϕ ˜12) R˜−→(˜α (ϕ ˜ )) ˜ ˜ ∗ 2R 2 12 R2(ϕ ˜12)= RBC(α2(ϕ ˜12), ϕ˜12)= sin(ϕ ˜12)

144 2.8 Appendix: Proofs

˜ ∗ ˜ ∗ ˜ so that we have RBC(α1(ϕ ˜12), ϕ˜12) = RBC(α2(ϕ ˜12), ϕ˜12) > 0. Since RBC(α,ϕ) is π continuous and strictly decreasing for α [0, 1) and a fixed ϕ [0, 2 ] it follows that ∗ ∗ ∈ ∈ α˜1(ϕ ˜12) =α ˜2(ϕ ˜12)=:α ˜12.

R˜−→(˜α ) R˜−→(˜α ) The equality 1R 12 = 2R 12 characterizes the radius of the intersection rate pair of the cos(ϕ ˜12) sin(ϕ ˜12) individual rate constraints of ˜ (˜α ). For any α the rate region ˜ (α) has only one CMAC 12 CMAC intersection rate pair of the individual rate constraints, which angle we denote by ϕ˜12(α). Since both rate constraints strictly increase with α, also the radius of the intersection strictly increases. Since R˜BC(α,ϕ) strictly decreases, we can conclude that there is only one time- division parameter where the intersection rate pair is on the boundary of R˜BC(α,ϕ) as well. It follows that ϕ˜12 is unique.

From the equality of R˜1(ϕ ˜12)= R˜2(ϕ ˜12) we can conclude

˜MAC ˜−→ ˜−→ ˜ RΣ (˜α12) < R1R(˜α12)+ R2R(˜α12)= RBC(˜α12, ϕ˜12)(sin(ϕ ˜12) + cos(ϕ ˜12)). ˜MAC ˜ Since RΣ (α) and RBC(α,ϕ) are strictly increasing and decreasing for α and fixed ϕ, it ∗ follows that for the optimal time-division parameter we have α˜Σ(ϕ ˜12) < α˜12 so that ˜ ˜ ˜ ˜ ∗ ˜ R1(ϕ ˜12)= R2(ϕ ˜12)= RBC(˜α12, ϕ˜12) > RBC(˜αΣ(ϕ ˜12), ϕ˜12)= RΣ(ϕ ˜).

Since ˜−→ and ˜ are strictly increasing and decreasing for and fixed , it R2R(α,ϕ) RBC(α,ϕ) α ϕ ∗ follows that for the optimal time-division parameter we have α˜2(ϕ ˜Σ1) < α˜Σ1 so that ˜ ˜ ˜ ˜ ∗ ˜ R1(ϕ ˜Σ1)= RΣ(ϕ ˜Σ1)= RBC(˜αΣ1, ϕ˜Σ1) < RBC(˜α2(ϕ ˜Σ1), ϕ˜Σ1)= R2(ϕ ˜).

The discussion for the intersections between the boundaries of ˜Σ and ˜1 or ˜2 is similar, which we will present here for completeness. For an intersectionR ofR the boRundaries ˜ RΣ and ˜ there must exist an angle ϕ˜ (0, π ) where the radii are equal, i.e. we have R1 Σ1 ∈ 2 R˜Σ(ϕ ˜Σ1)= R˜1(ϕ ˜Σ1). From Lemma 2.23 we additionally know that

R˜−→(˜α (ϕ ˜ )) ˜ ˜ ∗ 1R 1 Σ1 R1(ϕ ˜Σ1)= RBC(α1(ϕ ˜Σ1), ϕ˜Σ1)= cos(ϕ ˜Σ1) ˜MAC ˜ ˜ ∗ RΣ (˜αΣ(ϕ ˜Σ1)) RΣ(ϕ ˜Σ1)= RBC(αΣ(ϕ ˜Σ1), ϕ˜Σ1)= sin(ϕ ˜Σ1) + cos(ϕ ˜Σ1) ˜ ∗ ˜ ∗ ˜ so that we have RBC(α1(ϕ ˜Σ1), ϕ˜Σ1) = RBC(αΣ(ϕ ˜Σ1), ϕ˜Σ1) > 0. Since RBC(α,ϕ) is π continuous and strictly decreasing for α [0, 1) and a fixed ϕ [0, 2 ] it follows that ∗ ∗ ∈ ∈ α˜Σ(ϕ ˜Σ1) =α ˜2(ϕ ˜Σ1)=:α ˜Σ1.

MAC R˜−→(˜αΣ1) R˜ (˜α ) The equality 1R = Σ Σ1 characterizes the radius of the intersection rate cos(ϕ ˜Σ1) sin(ϕ ˜Σ1)+cos(ϕ ˜Σ1) pair of the individual rate constraint and the sum-rate constraint of ˜ (˜α ). For any CMAC Σ1

145 2 Bidirectional Relay Communication using Superposition Encoding

α the rate region ˜ (α) has only one intersection rate pair, which angle we will denote CMAC by ϕ˜Σ1(α). Since the individual and sum-rate constraints strictly increase with α, also the radius of the intersection strictly increases. Since R˜BC(α,ϕ) strictly decreases, we can con- clude that there is only one time-division parameter where the intersection rate pair is on the boundary of R˜BC(α,ϕ) as well. It follows that ϕ˜Σ1 is unique.

From the equality of R˜1(ϕ ˜Σ1)= R˜Σ(ϕ ˜Σ1) we can conclude R˜−→(˜α ) > R˜MAC(˜α ) R˜−→(˜α )= R˜ (˜α , ϕ˜ ) sin(ϕ ˜ ). 2R Σ1 Σ Σ1 − 1R Σ1 BC Σ1 Σ1 Σ1 Since ˜−→ and ˜ are strictly increasing and decreasing for and fixed , it R2R(α) RBC(α,ϕ) α ϕ ∗ follows that for the optimal time-division parameter we have α˜2(ϕ ˜Σ1) < α˜Σ1 so that ˜ ˜ ˜ ˜ ∗ ˜ R1(ϕ ˜Σ1)= RΣ(ϕ ˜Σ1)= RBC(˜αΣ1, ϕ˜Σ1) < RBC(˜α2(ϕ ˜Σ1), ϕ˜Σ1)= R2(ϕ ˜).

Finally, for an intersection of the boundaries ˜2 and ˜Σ there must exist an angle ϕ˜2Σ π R˜ R ˜ ∈ (0, 2 ) where the radii are equal, i.e. we have RΣ(ϕ ˜2Σ) = R2(ϕ ˜2Σ). From Lemma 2.23 we additionally know that

R˜−→(˜α (ϕ ˜ )) ˜ ˜ ∗ 2R 1 2Σ R2(ϕ ˜2Σ)= RBC(α1(ϕ ˜2Σ), ϕ˜2Σ)= sin(ϕ ˜2Σ) ˜MAC ˜ ˜ ∗ RΣ (˜αΣ(ϕ ˜2Σ)) RΣ(ϕ ˜2Σ)= RBC(αΣ(ϕ ˜2Σ), ϕ˜2Σ)= sin(ϕ ˜2Σ) + cos(ϕ ˜2Σ) ˜ ∗ ˜ ∗ ˜ so that we have RBC(α1(ϕ ˜2Σ), ϕ˜2Σ) = RBC(αΣ(ϕ ˜2Σ), ϕ˜2Σ) > 0. Since RBC(α,ϕ) is π continuous and strictly decreasing for α [0, 1) and a fixed ϕ [0, 2 ] it follows that ∗ ∗ ∈ ∈ α˜2(ϕ ˜2Σ) =α ˜Σ(ϕ ˜2Σ)=:α ˜2Σ.

MAC R˜−→(˜α2Σ) R˜ (˜α ) The equality 2R = Σ 2Σ characterizes the radius of the intersection rate sin(ϕ ˜2Σ) sin(ϕ ˜2Σ)+cos(ϕ ˜2Σ) pair of the individual rate constraint and the sum-rate constraint of ˜ (˜α ). For any CMAC 2Σ α the rate region ˜ (α) has only one intersection rate pair, which angle we will denote CMAC by ϕ˜2Σ(α). Since the individual and sum-rate constraints strictly increase with α, also the radius of the intersection strictly increases. Since R˜BC(α,ϕ) strictly decreases, we can con- clude that there is only one time-division parameter where the intersection rate pair is on the boundary of R˜BC(α,ϕ) as well. It follows that ϕ˜2Σ is unique.

From the equality of R˜2(ϕ ˜2Σ)= R˜Σ(ϕ ˜2Σ) we can conclude R˜−→(˜α ) > R˜MAC(˜α ) R˜−→(˜α )= R˜ (˜α , ϕ˜ ) cos(ϕ ˜ ). 1R 2Σ Σ 2Σ − 2R 2Σ BC 2Σ 2Σ 2Σ Since ˜−→ and ˜ are strictly increasing and decreasing for and fixed , it R1R(α) RBC(α,ϕ) α ϕ ∗ follows that for the optimal time-division parameter we have α˜1(ϕ ˜2Σ) < α˜2Σ so that ˜ ˜ ˜ ˜ ∗ ˜ R2(ϕ ˜2Σ)= RΣ(ϕ ˜2Σ)= RBC(˜α2Σ, ϕ˜2Σ) < RBC(˜α1(ϕ ˜2Σ), ϕ˜2Σ)= R1(ϕ ˜). This finishes the proof.

146 2.8 Appendix: Proofs

2.8.19 Proof of Corollary 2.25

Since ˜ is given by the intersection (2.39), the boundary is characterized by the rate RBRopt pairs on the boundaries of ˜ , ˜ , and ˜ which are most restrictive. For ϕ = 0 we R1 R2 RΣ know from (2.42a) that radius R˜1(0) is most restrictive for rate pairs on the abscissa [R1, 0]. This remains the case until the boundary of R˜Σ intersects the boundary of R˜1, i.e. for ϕ ϕ˜ . Then the radius R˜ (ϕ) is most restrictive until the boundary of R˜ intersects the ≤ 1Σ Σ 2 boundary of R˜ , i.e. for ϕ (ϕ ˜ , ϕ˜ ). Finally, for ϕ [ π , ϕ˜ ] the radius R˜ (ϕ) is most Σ ∈ 2Σ Σ1 ∈ 2 2Σ 2 restrictive.

2.8.20 Proof of Theorem 2.26

We first prove that ˜1 is convex. Therefore, we have to show that for any two rate pairs (k) (k) (k)R ˜ (1) R = [R1 , R2 ] 1, k = 1, 2, we have R(t)=[R1(t), R2(t)] := tR + (1 (2) ∈ R − t)R ˜ for all t [0, 1]. Therefore, let ϕ (k) and R (k) denote the angle and radius of ∈ R1 ∈ R R the rate vector R(k), k = 1, 2. (k) ˜ ˜ From R 1 it follows that RR(k) R1(ϕR(k) ), k = 1, 2. According to Lemma 2.23 ∈ R ≤ (k) R˜−→(˜α ) (k) ∗ 1R 1 there exist time-division parameters α˜1 := α1(ϕR(k) ) with RR(k) cos(ϕ ) so that we ≤ R(k) have (k) (k) R = R (k) cos(ϕ (k) ) R˜−→(˜α ), k = 1, 2. (2.89) 1 R R ≤ 1R 1 ˜(k) Then from Proposition 2.20 we additionally get the relay distribution factors β1 := ˜ (k) ˜ (k) ˜(k) βBC(˜α1 ,ϕR(k) ) so that we have RR(k) RBC(˜α1 , β1 ), k = 1, 2, which is equivalent to ≤ (k) (k) (k) (k) (k) (k) R R˜−→(˜α , β˜ ), R R˜−→(˜α , β˜ ). (2.90) 1 ≤ R2 1 1 2 ≤ R1 1 1 For t [0, 1] let us define α˜ (t) := tα˜(1) +(1 t)˜α(2) and β˜ (t) := tβ˜(1) +(1 t)β˜(2). From ∈ 1 1 − 1 1 1 − 1 Lemma 2.17 and 2.18 we know that ˜−→ , ˜−→ , and ˜−→ are concave. R1R(α) RR2(α,β) RR1(α,β)

Then let be the angle of ˜−→ ˜ ˜−→ ˜−→ ˜ , ϕ˜1(t) [min RR2(˜α1(t), β1(t)), R1R(˜α1(t)) , RR1(˜α1(t), β1(t))] which is given by { }

R˜−→(˜α (t),β˜ (t)) R1 1 1 arctan , if β˜1(t) = 0 min{R˜−→(˜α (t),β˜ (t)),R˜−→(˜α (t))} ϕ˜1(t) := R2 1 1 1R 1 6  π if ˜  2 , β1(t) = 0.

Note that if R˜−→(˜α (t), β˜ (t)) R˜−→(˜α (t)) we have ϕ˜ (t) =ϕ ˜ (˜α (t), β˜ (t)), else R2 1 1 ≤ 1R 1 1 BC 1 1 we have ϕ˜1(t) > ϕ˜BC(˜α1(t), β˜1(t)) because the inverse function of the tangent is strictly increasing.

147 2 Bidirectional Relay Communication using Superposition Encoding

In the following, we show that the boundary rate pair on ˜ with angle ϕ˜ (t) is component- R1 1 wise larger than R(t). To this end for the radius for this boundary rate pair we have

˜−→ R1R(α) R˜1(ϕ ˜1(t)) = max min R˜BC(α, ϕ˜1(t)), α∈[0,1] ( cos(ϕ ˜1(t))) R˜−→(˜α∗(ϕ ˜ (t))) ˜ ∗ 1R 1 1 = RBC(˜α1(ϕ ˜1(t)), ϕ˜1(t)) = (2.91) cos(ϕ ˜1(t)) ˜−→ R1R(˜α1(t)) min R˜BC(˜α1(t), ϕ˜1(t)), . (2.92) ≥ ( cos(ϕ ˜1(t)) )

We will now show that R1(t) R˜1(˜α1(t)) cos(ϕ ˜1(t)) and R2(t) R˜1(ϕ ˜1(t)) sin(ϕ ˜1(t)). Therefore, we have to distinguish≤ between two cases of the minimization≤ in (2.92).

R˜−→(˜α (t)) First, if R˜ (˜α (t), ϕ˜ (t)) > 1R 1 , which implies that ϕ˜ (t) < π , we have BC 1 1 cos(ϕ ˜1(t)) 1 2

cos(ϕ ˜ (t))R˜ (ϕ ˜ (t)) = R˜−→(˜α∗(ϕ ˜ (t))) R˜−→(˜α (t)) 1 1 1 1R 1 1 ≥ 1R 1 (1) (2) (1) (2) tR˜−→(˜α ) + (1 t)R˜−→(˜α ) tR + (1 t)R = R (t) ≥ 1R 1 − 1R 1 ≥ 1 − 1 1 where the first equality comes from (2.91) and the inequalities follow from (2.92), from the (k) concavity of ˜−→ , and from the definition of , , respectively. Further, we can R1R(α) α˜1 k = 1, 2 conclude

sin(ϕ ˜ (t))R˜ (ϕ ˜ (t)) = tan(ϕ ˜ (t))R˜−→(˜α∗(ϕ ˜ (t))) tan(ϕ ˜ (t))R˜−→(˜α (t)) 1 1 1 1 1R 1 1 ≥ 1 1R 1 R˜−→(˜α1(t), β˜1(t))R˜−→(˜α1(t)) = R1 1R min R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t)) { R2 1 1 1R 1 } ˜−→ ˜ ˜−→ RR1(˜α1(t), β1(t))R1R(˜α1(t)) = R˜−→(˜α1(t), β˜1(t)) ≥ ˜−→ R1 R1R(˜α1(t)) (1) (1) (2) (2) (1) (2) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) tR + (1 t)R = R (t) ≥ R1 1 1 − R1 1 1 ≥ 2 − 2 2 where the first equality and inequality are consequences of (2.91) and (2.92), the next follow from the definition of , from the concavity of ˜−→ , and from the definition of ϕ˜1(t) RR1(α,β) (k) α˜1 , k = 1, 2, respectively.

R˜−→(˜α (t)) 1R 1 For the case R˜BC(˜α1(t), ϕ˜1(t)) , which is equivalent to ≤ cos(ϕ ˜1(t))

R˜−→(˜α (t)) R˜ (˜α (t), ϕ˜ (t)) cos(ϕ ˜ (t)) = R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), (2.93) 1R 1 ≥ BC 1 1 1 R2 1 BC 1 1 we first prove the following claim.

148 2.8 Appendix: Proofs

Claim 2.57. From (2.93) it follows that ˜−→ ˜ RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) = ˜−→ ˜ . RR2(˜α1(t), β1(t))

π ˜ π ˜ Proof. If ϕ˜1(t) = 2 then we have βBC(˜α1(t), 2 )=0= β1(t) so that the claim π holds. For ϕ˜1(t) < 2 the claim will be proved by contradiction. To this end we as- sume that from (2.93) it follows that ˜−→ ˜ ˜−→ ˜ . RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) = RR2(˜α1(t), β1(t)) Then we have to distinguish between two cases. First, we assume6 that we have ˜−→ ˜ ˜−→ ˜ . Since ˜−→ is strictly increas- RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) > RR2(˜α1(t), β1(t)) RR2(α,β) ing for β we have β˜BC(˜α1(t), ϕ˜1(t)) > β˜1(t). This implies

˜−→ ˜ ˜−→ ˜ RR1(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) < RR1(˜α1(t), β1(t)) since ˜−→ is strictly decreasing for . Further, with (2.93) we have RR1(α,β) β

R˜−→(˜α (t)) R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))) > R˜−→(˜α (t), β˜ (t)) 1R 1 ≥ R2 1 BC 1 1 R2 1 1 so that we get the contradiction for the first case

˜−→ ˜ ˜−→ ˜ RR1(˜α1(t), β1(t)) RR1(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) tanϕ ˜1(t)= > = tanϕ ˜1(t). ˜−→ ˜ ˜−→ ˜ RR2(˜α1(t), β1(t)) RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t)))

Now we assume ˜−→ ˜ ˜−→ ˜ so that ˜ RR2(˜α1(t), β1(t)) > RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) β1(t) > ˜ and ˜−→ ˜ ˜−→ ˜ follow imme- βBC(˜α1(t), ϕ˜1(t)) RR1(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) > RR1(˜α1(t), β1(t)) diately. Then we get a contradiction for the second case from the following

˜−→ ˜ RR1(˜α1(t), β1(t)) tanϕ ˜1(t)= min R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t)) { R2 1 1 1R 1 } ˜−→ ˜ RR1(˜α1(t), β1(t)) ≤ min R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), R˜−→(˜α (t)) { R2 1 BC 1 1 1R 1 } ˜−→ ˜ ˜−→ ˜ RR1(˜α1(t), β1(t)) RR1(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) = < = tanϕ ˜1(t) ˜−→ ˜ ˜−→ ˜ RR2(˜α1(t), β1(t)) RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) where we used the fact that for a < b, a,c = 0 we have 1 1 , (2.93), and the 6 min{b,c} ≤ min{a,c} monotony of ˜−→ and ˜−→ for . RR2(α,β) RR1(α,β) β

Note that the claim implies β˜1(t) = β˜BC(˜α1(t), ϕ˜1(t)). From Claim 2.57 with (2.93) we conclude that R˜−→(˜α (t)) R˜−→(˜α (t), β˜ (t)) holds so that we have ϕ˜ (t) = 1R 1 ≥ R2 1 1 1

149 2 Bidirectional Relay Communication using Superposition Encoding

ϕ˜BC(˜α1(t), β˜1(t)). Accordingly, we get

˜ ˜ ˜−→ ˜ cos(ϕ ˜1(t))R1(ϕ ˜1(t)) = cos(ϕ ˜1(t))RBC(˜α1(t), ϕ˜1(t)) = RR2(˜α1(t), β1(t)) (1) (1) (2) (2) (1) (2) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) tR + (1 t)R = R (t) ≥ R2 1 1 − R2 1 1 ≥ 1 − 1 1 where we used (2.93), Claim 2.57 and the concavity of ˜−→ ˜ . For the rate RR2(˜α1(t), β1(t)) R2(t) we have

˜ ˜ ˜−→ ˜ sin(ϕ ˜1(t))R1(ϕ ˜1(t)) = sin(ϕ ˜1(t))RBC(˜α1(t), ϕ˜1(t)) = tan(ϕ ˜1(t))RR2(˜α1(t), β1(t)) R˜−→(˜α1(t), β˜1(t))R˜−→(˜α1(t), β˜1(t)) = R1 R2 min R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t)) { R2 1 1 1R 1 } R˜−→(˜α1(t), β˜1(t))R˜−→(˜α1(t), β˜1(t)) = R1 R2 min R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), R˜−→(˜α (t)) { R2 1 BC 1 1 1R 1 } R˜−→(˜α1(t), β˜1(t))R˜−→(˜α1(t), β˜1(t)) R˜−→(˜α1(t), β˜1(t))R˜−→(˜α1(t), β˜1(t)) = R1 R2 = R1 R2 ˜−→ ˜ ˜−→ ˜ RR2(˜α1(t), βBC(˜α1(t), ϕ˜1(t))) RR2(˜α1(t), β1(t)) (1) (1) (2) (2) =R˜−→(˜α (t), β˜ (t)) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) R1 1 1 ≥ R1 1 1 − R1 1 1 tR(1) + (1 t)R(2) = R (t) ≥ 2 − 2 2 where we have used (2.93) and Claim 2.57, the definition of ϕ˜1(t), and the concavity of R˜−→(˜α (t), β˜ (t)). It follows that R(t) ˜ for all t [0, 1] so that we conclude that ˜ R1 1 1 ∈ R1 ∈ R1 is convex!

The proof of convexity of ˜ is similar, but differs at some points so that we will present R2 it here for completeness. Again we have to show that for any two rate pairs R(k) = [R(k), R(k)] ˜ , k = 1, 2, we have R(t)=[R (t), R (t)] := tR(1) + (1 t)R(2) ˜ 1 2 ∈ R2 1 2 − ∈ R2 for all t [0, 1]. Therefore, let ϕ (k) and R (k) denote the angle and radius of the rate ∈ R R vector R(k), k = 1, 2. (k) ˜ ˜ From R 2 it follows that RR(k) R2(ϕR(k) ), k = 1, 2. According to Lemma 2.23 ∈ R ≤ (k) R˜−→(˜α ) (k) ∗ 2R 2 there exist time-division parameters α˜2 := α2(ϕR(k) ) with RR(k) sin(ϕ ) so that we ≤ R(k) have (k) (k) R = R (k) sin(ϕ (k) ) R˜−→(˜α ), k = 1, 2. (2.94) 2 R R ≤ 2R 2 ˜(k) Then from Proposition 2.20 we additionally get the relay distribution factors β2 := (k) (k) (k) β˜ (˜α ,ϕ (k) ) so that we have R (k) R˜ (˜α , β˜ ), k = 1, 2, which is equivalent BC 2 R R ≤ BC 2 2 to (k) (k) (k) (k) (k) (k) R R˜−→(˜α , β˜ ), R R˜−→(˜α , β˜ ). (2.95) 1 ≤ R2 2 2 2 ≤ R1 2 2

150 2.8 Appendix: Proofs

For t [0, 1] let us define α˜ (t) := tα˜(1) +(1 t)˜α(2) and β˜ (t) := tβ˜(1) +(1 t)β˜(2). From ∈ 2 2 − 2 2 2 − 2 Lemma 2.17 and 2.18 we know that ˜−→ , ˜−→ , and ˜−→ are concave. R2R(α) RR2(α,β) RR1(α,β)

Then let be the angle of ˜−→ ˜ ˜−→ ˜ ˜−→ , ϕ˜2(t) [RR2(˜α2(t), β2(t)), min RR1(˜α2(t), β2(t)), R2R(˜α2(t)) ] which is given by { }

min{R˜−→(˜α (t),β˜ (t)),R˜−→(˜α (t))} R1 2 2 2R 2 arctan , if β˜2(t) = 0 R˜−→(˜α (t),β˜ (t)) ϕ˜2(t) := R2 2 2 6  π if ˜  2 , β2(t) = 0.

Note that if R˜−→(˜α (t), β˜ (t)) R˜−→(˜α (t)) we have ϕ˜ (t) =ϕ ˜ (˜α (t), β˜ (t)), else R2 2 2 ≤ 2R 2 2 BC 2 2 we have ϕ˜2(t) > ϕ˜BC(˜α1(t), β˜1(t)) because the inverse function of the tangent is strictly increasing. In the following, we show that the boundary rate pair on ˜ with angle ϕ˜ (t) is component- R2 2 wise larger than R(t). To this end for the radius for this boundary rate pair we have

˜−→ R2R(α) R˜2(ϕ ˜2(t)) = max min R˜BC(α, ϕ˜2(t)), α∈[0,1] ( sin(ϕ ˜2(t))) R˜−→(˜α∗(ϕ ˜ (t))) ˜ ∗ 2R 2 2 = RBC(˜α2(ϕ ˜2(t)), ϕ˜2(t)) = (2.96) sin(ϕ ˜2(t)) ˜−→ R2R(˜α2(t)) min R˜BC(˜α2(t), ϕ˜2(t)), . (2.97) ≥ ( sin(ϕ ˜2(t)) )

We will now show that R (t) R˜ (ϕ ˜ (t)) cos(ϕ ˜ (t)) and R (t) R˜ (ϕ ˜ (t)) sin(ϕ ˜ (t)). 1 ≤ 2 2 2 2 ≤ 2 2 2 Therefore, we have to distinguish between two cases of the minimization in (2.97).

R˜−→(˜α (t)) First, if R˜ (˜α (t), ϕ˜ (t)) > 2R 2 , which implies that ϕ˜ (t) > 0, we have BC 2 2 sin(ϕ ˜2(t)) 2

˜−→ ∗ ˜−→ R2R(˜α2(ϕ ˜2(t))) R2R(˜α2(t)) cos(ϕ ˜2(t))R˜2(ϕ ˜2(t)) = tan(ϕ ˜2(t)) ≥ tan(ϕ ˜2(t))

R˜−→(˜α2(t), β˜2(t))R˜−→(˜α2(t)) = R2 2R min R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t)) { R1 2 2 2R 2 } ˜−→ ˜ ˜−→ RR2(˜α2(t), β2(t))R2R(˜α2(t)) = R˜−→(˜α2(t), β˜2(t)) ≥ ˜−→ R2 R2R(˜α2(t)) (1) (1) (2) (2) (1) (2) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) tR + (1 t)R = R (t) ≥ R2 2 2 − R2 2 2 ≥ 1 − 1 1 where the first equality and inequality are consequences of (2.96) and (2.97), the next follow from the definition of , from the concavity of ˜−→ , and from the definition of ϕ˜2(t) RR2(α,β)

151 2 Bidirectional Relay Communication using Superposition Encoding

(k) α˜2 , k = 1, 2, respectively. Further, we can conclude

sin(ϕ ˜ (t))R˜ (ϕ ˜ (t)) = R˜−→(˜α∗(ϕ ˜ (t))) R˜−→(˜α (t)) 2 2 2 2R 2 2 ≥ 2R 2 (1) (2) (1) (2) tR˜−→(˜α ) + (1 t)R˜−→(˜α ) tR + (1 t)R = R (t) ≥ 2R 2 − 2R 2 ≥ 2 − 2 2 where the first equality comes from (2.96) and the inequalities follow from (2.97), from the (k) concavity of ˜−→ , and from the definition of , , respectively. R2R(α) α˜2 k = 1, 2

R˜−→(˜α (t)) 2R 2 For the case R˜BC(˜α2(t), ϕ˜2(t)) , which is equivalent to ≤ sin(ϕ ˜2(t))

R˜−→(˜α (t)) R˜ (˜α (t), ϕ˜ (t)) sin(ϕ ˜ (t)) = R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), (2.98) 2R 2 ≥ BC 2 2 2 R1 2 BC 2 2 we first prove the following claim.

Claim 2.58. From (2.98) it follows that ˜−→ ˜ RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) = ˜−→ ˜ . RR1(˜α2(t), β2(t))

Proof. If ϕ˜2(t) = 0 then we have β˜BC(˜α2(t), 0) = 1 = β˜2(t) so that the claim holds. For ϕ˜2(t) > 0 the claim will be proved by contradiction. To this end we as- sume that from (2.98) it follows that R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))) = R˜−→(˜α (t), β˜ (t)). R1 2 BC 2 2 6 R1 2 2 Then we have to distinguish between two cases. First, we assume that we have ˜−→ ˜ ˜−→ ˜ . Since ˜−→ is strictly increas- RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) > RR1(˜α2(t), β2(t)) RR2(α,β) ing for β we have β˜BC(˜α2(t), ϕ˜2(t)) < β˜2(t). This implies

˜−→ ˜ ˜−→ ˜ RR2(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) < RR2(˜α2(t), β2(t)) since ˜−→ is strictly increasing for . Further, with (2.98) we have RR2(α,β) β

R˜−→(˜α (t)) R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))) > R˜−→(˜α (t), β˜ (t)) 2R 2 ≥ R1 2 BC 2 2 R1 2 2 so that we get the contradiction for the first case

˜−→ ˜ ˜−→ ˜ RR1(˜α2(t), β2(t)) RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) tanϕ ˜2(t)= < = tanϕ ˜2(t). ˜−→ ˜ ˜−→ ˜ RR2(˜α2(t), β2(t)) RR2(˜α2(t), βBC(˜α2(t), ϕ˜2(t)))

Now we assume ˜−→ ˜ ˜−→ ˜ so that ˜ RR1(˜α2(t), β2(t)) > RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) β2(t) < ˜ and ˜−→ ˜ ˜−→ ˜ follow imme- βBC(˜α2(t), ϕ˜2(t)) RR2(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) > RR2(˜α2(t), β2(t))

152 2.8 Appendix: Proofs diately. Then we get a contradiction for the second case from the following

˜−→ ˜ ˜−→ min RR1(˜α2(t), β2(t)), R2R(˜α2(t)) tanϕ ˜2(t)= { } ˜−→ ˜ RR2(˜α2(t), β2(t)) min R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), R˜−→(˜α (t)) { R1 2 BC 2 2 2R 2 } ≥ ˜−→ ˜ RR2(˜α2(t), β2(t)) ˜−→ ˜ ˜−→ ˜ RR1(˜α2(t), β2(t)) RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) = > = tanϕ ˜2(t) ˜−→ ˜ ˜−→ ˜ RR2(˜α2(t), β2(t)) RR2(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) where we used the fact that for a < b we have min b, c min a,c , (2.98), and the { } ≥ { } monotony of ˜−→ and ˜−→ for and fixed . RR1(α,β) RR2(α,β) β α

Note that the claim implies β˜2(t) = β˜BC(˜α2(t), ϕ˜2(t)). From Claim 2.58 with (2.98) we conclude that R˜−→(˜α (t)) R˜−→(˜α (t), β˜ (t)) holds so that we have ϕ˜ (t) = 2R 2 ≥ R2 2 2 2 ϕ˜BC(˜α2(t), β˜2(t)). Accordingly, we get

cos(ϕ ˜2(t))R˜2(ϕ ˜2(t)) = cos(ϕ ˜2(t))R˜BC(˜α2(t), ϕ˜2(t))

R˜−→(˜α2(t), β˜2(t)) R˜−→(˜α2(t), β˜2(t))R˜−→(˜α2(t), β˜2(t)) = R1 = R1 R2 tan(ϕ ˜2(t)) min R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t)) { R1 2 2 2R 2 } R˜−→(˜α2(t), β˜2(t))R˜−→(˜α2(t), β˜2(t)) = R1 R2 min R˜−→(˜α (t), β˜ (˜α (t), ϕ˜ (t))), R˜−→(˜α (t)) { R1 2 BC 2 2 2R 2 } R˜−→(˜α2(t), β˜2(t))R˜−→(˜α2(t), β˜2(t)) R˜−→(˜α2(t), β˜2(t))R˜−→(˜α2(t), β˜2(t)) = R1 R2 = R1 R2 ˜−→ ˜ ˜−→ ˜ RR1(˜α2(t), βBC(˜α2(t), ϕ˜2(t))) RR1(˜α2(t), β2(t)) (1) (1) (2) (2) =R˜−→(˜α (t), β˜ (t)) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) R2 2 2 ≥ R2 2 2 − R2 2 2 tR(1) + (1 t)R(2) = R (t) ≥ 1 − 1 1 where we have used (2.98) and Claim 2.58, the definition of ϕ˜2(t), and the concavity of ˜−→ ˜ . For the rate we have RR2(˜α2(t), β2(t)) R2(t)

˜ ˜ ˜−→ ˜ sin(ϕ ˜2(t))R2(ϕ ˜2(t)) = sin(ϕ ˜2(t))RBC(˜α2(t), ϕ˜2(t)) = RR1(˜α2(t), β2(t)) (1) (1) (2) (2) (1) (2) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) tR + (1 t)R = R (t) ≥ R1 2 2 − R1 2 2 ≥ 2 − 2 2 where we used (2.98), Claim 2.58 and the concavity of ˜−→ ˜ . It follows that RR1(˜α2(t), β2(t)) R(t) ˜ for all t [0, 1] so that we conclude that ˜ is convex! ∈ R2 ∈ R2 Finally, we have to prove that ˜ is convex. Therefore, we have to show that for any RΣ two rate pairs R(k) = [R(k), R(k)] ˜ , k = 1, 2, we have R(t)=[R (t), R (t)] := 1 2 ∈ RΣ 1 2

153 2 Bidirectional Relay Communication using Superposition Encoding

(1) (2) tR + (1 t)R ˜ for all t [0, 1]. Therefore, let ϕ (k) and R (k) denote the angle − ∈ RΣ ∈ R R and radius of the rate vector R(k), k = 1, 2. (k) ˜ ˜ From R Σ it follows that RR(k) RΣ(ϕR(k) ), k = 1, 2. According to Lemma 2.23 ∈ R ≤ ˜MAC (k) (k) ∗ RΣ (˜αΣ ) there exist time-division parameters α˜Σ := αΣ(ϕR(k) ) with RR(k) cos(ϕ )+sin(ϕ ) ≤ R(k) R(k) so that we have

(k) (k) MAC (k) R + R = R (k) (cos(ϕ (k) ) + sin(ϕ (k) )) R˜ (˜α ), k = 1, 2. (2.99) 1 2 R R R ≤ Σ Σ ˜(k) Then from Proposition 2.20 we additionally get the relay distribution factors βΣ := ˜ (k) ˜ (k) ˜(k) βBC(˜αΣ ,ϕR(k) ) so that we have RR(k) RBC(˜αΣ , βΣ ), k = 1, 2, which is equivalent to ≤ (k) (k) (k) (k) (k) (k) R R˜−→(˜α , β˜ ), R R˜−→(˜α , β˜ ). (2.100) 1 ≤ R2 Σ Σ 2 ≤ R1 Σ Σ For t [0, 1] let us define α˜ (t) := tα˜(1)+(1 t)˜α(2) and β˜ (t) := tβ˜(1)+(1 t)β˜(2). From ∈ Σ Σ − Σ Σ Σ − Σ Lemma 2.17 and 2.18 we know that ˜MAC , ˜−→ , and ˜−→ are concave. RΣ (α) RR2(α,β) RR1(α,β)

We define the rate vector R ˜ := [R˜−→(˜α (t), β˜ (t)), R˜−→(˜α (t), β˜ (t))] with BC(˜αΣ(t),βΣ(t)) R2 Σ Σ R1 Σ Σ ˜ angle ϕ˜BC(˜αΣ(t), βΣ(t)) of the polar coordinates. Furthermore, ϕR(t) specifies the angle of the rate pair R(t)=[R1(t), R2(t)]. Then the angle ϕ˜Σ(t) of the component-wise dominant rate pair is given by

ϕ , if R˜BC(˜α (t), β˜ (t)) > R˜MAC(˜α (t)) ϕ˜ (t) := R(t) Σ Σ Σ Σ Σ (2.101) Σ ˜ ˜BC ˜ ˜MAC (ϕ˜BC(˜αΣ(t), βΣ(t)), if R (˜αΣ(t), βΣ(t)) R (˜αΣ(t)). Σ ≤ Σ with R ˜ ˜−→ ˜ ˜−→ ˜ . BC(˜αΣ(t), βΣ(t))=[RR2(˜αΣ(t), βΣ(t)), RR1(˜αΣ(t), βΣ(t))] In the following, we show that the boundary rate pair on ˜ with angle ϕ˜ (t) is component- RΣ Σ wise larger than R(t). To this end for the radius for this boundary rate pair we have

˜MAC RΣ (α) R˜Σ(ϕ ˜Σ(t)) = max min R˜BC(α, ϕ˜Σ(t)), α∈[0,1] ( cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t))) ˜MAC ∗ ˜ ∗ RΣ (˜αΣ(ϕ ˜Σ(t))) = RBC(˜αΣ(ϕ ˜Σ(t)), ϕ˜Σ(t)) = (2.102) cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)) ˜MAC RΣ (˜αΣ(t)) min R˜BC(˜αΣ(t), ϕ˜Σ(t)), . (2.103) ≥ ( cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)))

We will now show that R (t) R˜ (ϕ ˜ (t)) cos(ϕ ˜ (t)) and R (t) 1 ≤ Σ Σ Σ Σ ≤ R˜Σ(ϕ ˜Σ(t)) sin(ϕ ˜Σ(t)). Therefore, we have to distinguish between two cases of the

154 2.8 Appendix: Proofs

minimization in (2.103) for the two cases of possible angles ϕ˜Σ(t) of (2.101). To this end ˜MAC we will use the concavity of RΣ (˜αΣ(t)), i.e.

R˜MAC(˜α (t)) tR˜MAC(1) + (1 t)R˜MAC(2) t(R(1) + R(1)) + (1 t)(R(2) + R(2)) Σ Σ ≥ Σ − Σ ≥ 1 2 − 1 2 (1) (2) (1) (2) (tR1 + (1 t)R1 ) + (tR2 + (1 t)R2 )= R1(t)+ R2(t). ≥ − − (2.104)

˜MAC RΣ (˜αΣ(t)) First we consider the case R˜BC(˜αΣ(t), ϕ˜Σ(t)) > . Then we have to cos(ϕ ˜Σ(t))+sin(ϕ ˜Σ(t)) distinguish between the two cases of (2.103). Since for R˜MAC(˜α (t)) R˜BC(˜α (t), β˜ (t)) Σ Σ ≥ Σ Σ Σ we have ϕ˜Σ(t) =ϕ ˜BC(˜αΣ(t), β˜Σ(t)) which implies that we have R˜BC(˜αΣ(t), ϕ˜Σ(t)) = R˜BC(˜αΣ(t), β˜Σ(t)) it follows that this case is not possible. Furthermore, it follows that we ˜MAC ˜BC ˜ have RΣ (˜αΣ(t)) < RΣ (˜αΣ(t), βΣ(t)) with ϕ˜Σ(t)= ϕR(t). Therewith, we get

˜MAC ∗ ˜MAC cos(ϕ ˜Σ(t))RΣ (˜αΣ(ϕ ˜Σ(t))) RΣ (˜αΣ(t)) cos(ϕ ˜Σ(t)) cos(ϕ ˜Σ(t))R˜Σ(ϕ ˜Σ(t)) = cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)) ≥ cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)) R˜MAC(˜α (t)) R˜MAC(˜α (t)) = Σ Σ = Σ Σ 1 + tan(ϕ ˜Σ(t)) 1 + tan(ϕR(t)) R1(t)+ R2(t) R1(t)+ R2(t) = = R1(t) ≥1 + tan(ϕR(t)) 1+ R2(t)/R1(t) where the first equality and inequality are consequences of (2.102) and (2.103), then we used (2.104), the fact ϕ˜Σ(t) = ϕR(t), and finally the definition of ϕ˜Σ(t). Similarly, we can conclude that

˜MAC ∗ ˜MAC sin(ϕ ˜Σ(t))RΣ (˜αΣ(ϕ ˜Σ(t))) RΣ (˜αΣ(t)) sin(ϕ ˜Σ(t)) sin(ϕ ˜Σ(t))R˜Σ(ϕ ˜Σ(t)) = cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)) ≥ cos(ϕ ˜Σ(t)) + sin(ϕ ˜Σ(t)) R˜MAC(˜α (t)) R˜MAC(˜α (t)) = Σ Σ = Σ Σ 1 + 1/ tan(ϕ ˜Σ(t)) 1 + 1/ tan(ϕR(t)) R1(t)+ R2(t) R1(t)+ R2(t) = = R2(t) ≥1 + 1/ tan(ϕR(t)) 1+ R1(t)/R2(t) so that it follows that [R (t), R (t)] ˜ for this case. 1 2 ∈ RΣ ˜MAC RΣ (˜αΣ(t)) We now consider the case R˜BC(˜αΣ(t), ϕ˜Σ(t)) . Again we have ≤ cos(ϕ ˜Σ(t))+sin(ϕ ˜Σ(t)) to distinguish between the two cases of (2.103). First, we assume that we have R˜BC(˜α (t), β˜ (t)) R˜MAC(˜α (t)) so that we have ϕ˜ (t) =ϕ ˜ (˜α (t), β˜ (t)) which Σ Σ Σ ≤ Σ Σ Σ BC Σ Σ implies that we have β˜Σ(t) = β˜BC(˜αΣ(t), ϕ˜Σ(t)) or equivalently R˜BC(˜αΣ(t), ϕ˜Σ(t)) =

155 2 Bidirectional Relay Communication using Superposition Encoding

R˜BC(˜αΣ(t), β˜Σ(t)). Therewith, we have ˜ ˜ ∗ cos(ϕ ˜Σ(t))RΣ(ϕ ˜Σ(t)) = cos(ϕ ˜Σ(t))RBC(˜αΣ(ϕ ˜Σ(t)), ϕ˜Σ(t)) cos(ϕ ˜ (t))R˜ (˜α (t), ϕ˜ (t)) = cos(ϕ ˜ (t))R˜ (˜α (t), β˜ (t)) ≥ Σ BC Σ Σ Σ BC Σ Σ (1) (1) (2) (2) = R˜−→(˜α (t), β˜ (t)) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) R2 Σ Σ ≥ R2 Σ Σ − R2 Σ Σ tR(1) + (1 t)R(2) = R (t) ≥ 1 − 1 1 where the first equality and inequality are consequences of (2.102) and (2.103), then we used the fact ˜ ˜ ˜ and the concavity of ˜−→ . RBC(˜αΣ(t), ϕ˜Σ(t)) = RBC(˜αΣ(t), βΣ(t)) RR2(α,β) Similarly, with the concavity of ˜−→ we get RR1(α,β) ˜ ˜ ∗ sin(ϕ ˜Σ(t))RΣ(ϕ ˜Σ(t)) = sin(ϕ ˜Σ(t))RBC(˜αΣ(ϕ ˜Σ(t)), ϕ˜Σ(t)) sin(ϕ ˜ (t))R˜ (˜α (t), ϕ˜ (t)) = sin(ϕ ˜ (t))R˜ (˜α (t), β˜ (t)) ≥ Σ BC Σ Σ Σ BC Σ Σ (1) (1) (2) (2) = R˜−→(˜α (t), β˜ (t)) tR˜−→(˜α , β˜ ) + (1 t)R˜−→(˜α , β˜ ) R1 Σ Σ ≥ R1 Σ Σ − R1 Σ Σ tR(1) + (1 t)R(2) = R (t) ≥ 2 − 2 2 so that [R (t), R (t)] ˜ for this case as well. 1 2 ∈ RΣ ˜MAC RΣ (˜αΣ(t)) Finally, we assume that we have R˜BC(˜αΣ(t), ϕ˜Σ(t)) and ≤ cos(ϕ ˜Σ(t))+sin(ϕ ˜Σ(t)) ˜BC ˜ ˜MAC RΣ (˜αΣ(t), βΣ(t)) > RΣ (˜αΣ(t)) which implies that we have ϕ˜Σ(t)= ϕR(t). First note that R˜ (˜α (t), ϕ˜ (t)) denotes the radius of the rate pair on the boundary of ˜ (˜α (t)) BC Σ Σ RBC Σ with angle ϕ˜Σ(t), i.e.

˜ 2 2 RBC(˜αΣ(t), ϕ˜Σ(t)) = max R1 + R2. [R1,R2]∈R˜ BC(˜αΣ(t)) R1 sinϕ ˜Σ(t)=R2 cosϕ ˜Σ(t) q

To prove the component-wise dominance of R˜BC(˜αΣ(t), ϕ˜Σ(t))[cos(ϕ ˜Σ(t)), sin(ϕ ˜Σ(t))] we define the downward comprehensive hull16 ˆ(t) := dch(R (˜α (t), β˜ (t))) of the rate R BC Σ Σ pair RBC(˜αΣ(t), β˜Σ(t)). Then, let

2 2 RRˆ(t)(ϕ ˜Σ(t)) := max R1 + R2 [R1,R2]∈Rˆ(t) R1 sinϕ ˜Σ(t)=R2 cosϕ ˜Σ(t) q denote the radius of the rate pair on the boundary of the downward comprehensive hull of the vector R ˜ ˜−→ ˜ ˜−→ ˜ with angle BC(˜αΣ(t), βΣ(t)) = [RR2(˜αΣ(t), βΣ(t)), RR1(˜αΣ(t), βΣ(t))]

16 2 A set A is downward comprehensive in Ê+, if for any x = [x1, x2] ∈ A it follows that for any y = [y1, y2] ∈ 2 Ê+ with xi ≤ yi, i = 1, 2, we have y ∈ A. Then we define the downward comprehensive hull of the vector

2 2 Ê x ∈ Ê+ by the set dch(x) := {y ∈ + : yi ≤ xi, i = 1, 2}.

156 2.8 Appendix: Proofs

ϕ˜ (t). Since we have R (˜α (t), β˜ (t)) ˜ (˜α (t)), it follows the inclusion ˆ(t) Σ BC Σ Σ ∈ RBC Σ R ⊆ ˜ (˜α (t)). Therefrom, we can conclude that R (ϕ ˜ (t)) R˜ (˜α (t), ϕ˜ (t)) holds. RBC Σ Rˆ(t) Σ ≤ BC Σ Σ Furthermore, from the concavity of ˜−→ and ˜−→ we know RR2(α,β) RR1(α,β)

R (t) R˜−→(˜α (t), β˜ (t)), R (t) R˜−→(˜α (t), β˜ (t)). 1 ≤ R2 Σ Σ 2 ≤ R1 Σ Σ

It follows that R(t)=[R (t), R (t)] ˆ(t). Since we have ϕ˜ (t) = ϕ , we can 1 2 ∈ R Σ R(t) conclude that R(t) = (R (t))2 + (R (t))2 R (ϕ ˜ (t)). Altogether, we have || ||1 1 2 ≤ Rˆ(t) Σ p R˜ (ϕ ˜ (t)) = R˜ (˜α∗ (ϕ ˜ (t)), ϕ˜ (t)) R˜ (˜α (t), ϕ˜ (t)) Σ Σ BC Σ Σ Σ ≥ BC Σ Σ = R˜ (˜α (t),ϕ ) R (ϕ ) R(t) BC Σ R(t) ≥ Rˆ(t) R(t) ≥ || ||1 so that we have

cos(ϕ ˜ (t))R˜ (ϕ ˜ (t)) cos(ϕ ) R(t) = R Σ Σ Σ ≥ R(t) || ||1 1 sin(ϕ ˜ (t))R˜ (ϕ ˜ (t)) sin(ϕ ) R(t) = R . Σ Σ Σ ≥ R(t) || ||1 2

This was the last case where we have shown that [R (t), R (t)] ˜ for all t [0, 1] so 1 2 ∈ RΣ ∈ that we can conclude that ˜ is convex as well. RΣ

Finally, since the intersection of convex sets is convex it follows that ˜ = ˜ ˜ ˜ RBRopt R1∩R2∩RΣ is convex as well.

2.8.21 Proof of Corollary 2.30

From the queue evolution equation (2.43) we have

Q2[n + 1] Q [n] R [n]T 2 + B2[n] + 2B [n] Q [n] R [n]T k ≤ k − k k k k − k + 2 Q [n] R [n]T  + B2[n] + 2B [n]Q [n]  ≤ k − k k k k 2 Bk[n] 2 2 Q [n] 2T Qk[n]Rk[n] + Rk[n]T + B [n] ≤ k − − T k  

157 2 Bidirectional Relay Communication using Superposition Encoding for k = 1, 2. Using this inequality the one-step drift gives us

2

2 2 E E L Q[n + 1] L Q[n] Q[n]= q = Q [n + 1] Q [n] Q[n]= q − k − k k=1     X 2 Bk[n] 2 2 E 2T Q [n] R [n] + R [n]T + B [n] Q[n]= q ≤ − k k − T k k k=1  X   2

2 2 2 E = T E R [n] Q[n]= q + B [n] (2.105) k | k Xk=1  2 

Bk[n] E 2T q E R [n] Q[n]= q (2.106) − k k | − T k=1 X  =λk  2

Bk[n] | {z } E υ 2T q E R [n] Q[n]= q , ≤ − k k | − T k=1 X    where we used for the first term of the sum (2.105) the inequality

2

2 2 2 2 2 2 E T E Rk[n] Q[n]= q T max R1 + R2 = υ Bk[n] . (2.107) | ≤ h∈H,R∈R (h) − k=1 BR  X   For the second term of the sum (2.106) we have

2 2

qk E Rk[n] Q[n]= q = max qkRk > λ1 + λ2, | R∈R k=1 BR k=1 X  X since we require [λ , λ ] to be strictly in the interior of . Accordingly, there exists ζ˜ > 0 1 2 RBR so that the vector [λ1 + ζ,˜ λ2 + ζ˜] is still in BR. Therefore, we get for the second term of the sum (2.106) the inequality R

2 2 ˜ 2T q E R [n] Q[n]= q λ 2T ζ q . k k | − k ≥ k k=1 k=1 X   X All together we have

2

E L Q[n + 1] L Q[n] Q[n]= q υ ζ q − ≤ − k k=1    X with ζ = 2T ζ˜. For any arbitrary ε > 0 we can define the compact region Λ := q ∈ 2 2 2 υ+ε υ+ε n Ê+ qk ζ . Whenever q / Λ we have qk > ζ and therefore we have a k=1 ≤ ∈ k=1 o negative P one-step Lyapunov drift E L Q[n + 1] PL Q[n] Q[n]= q < ε. − −   

158 2.8 Appendix: Proofs

2.8.22 Proof of Lemma 2.35

The cdf of Zn follows from

F (z )= È min a x , b y z Zn n { n n n n}≤ n

= 1 È min a x , b y >z

− { n n n n} n È = 1 È a x >z b y >z −  n n n n n n = 1 (1 F (z /a ))(1 F (z /b )) − − Xn n n  − Yn n n

and the pdf is given by its derivation. Accordingly, fZ (z) is the derivation of the cdf È FZ (z)= È max zn z = z zn = FZ (zn), n { }≤ ≥ n n n  Y  Y since we assume that the random variables Zn are pairwise independent. Finally, R = g(Z) = log(1+ Z)/2 is the function of the random variable Z where g(Z) is strictly in- creasing and differentiable in Z [PP02, Chap. 5]. For that reason the pdf is given by

f (g−1(R)) f (R)= Z = 2 ln(2)22Rf (22R 1), R g′(g−1(R)) Z − | | where g′(Z)= 1 and g−1(R) = 22R 1 denote the derivative and inverse of g(Z) 2 ln(2)(1+Z) − respectively.

2.8.23 Proof of Proposition 2.37

For independent channel realizations the achievable rate region of the η-th relay node con- tains the regions of all others iff we have h max h for k = 1, 2 simul- | k,η| ≥ n=1,...,N {| k,n|} taneously. With È h h h = F ( h ) it follows that | k,η|≥| k,n| | k,η| |hk,n| | k,η| 

2 È È BReq,η BReq,n = hk,η max hk,n R ⊇ R | |≥ n=1,...,N{| |} n n [ o kY=1 n o 2

= È hk,η max hk,n hk,η f|h |( hk,η ) d hk,η | |≥ n=1,...,N{| |} | | k,η | | | | k=1 Z n o Y 2 N

= È h h h f ( h ) d h . | k,η|≥| k,n| | k,η| |hk,η| | k,η| | k,η| k=1 Z n=1 n o Y nY6=η

159 2 Bidirectional Relay Communication using Superposition Encoding

Then the probability that there exists one relay node η 1,...,N which rate region contains the others is given by the disjoint disjunction ∈ { }

N È È η : = = ( ) ∃ RRSeq RBReq,η RBReq,η ⊇ RBReq,n η=1 n  n _ [ o N

= È . RBReq,η ⊇ RBReq,n η=1 n X n [ o

In the case of iid Rayleigh fading we have

È hk,η max hk,n | |≥ n=1,...,N{| |} n ∞ o 2 2 hk,η N−1 2 hk,η hk,η = 1 exp | 2 | | 2 | exp | 2 | d hk,η − − σk σk − σk | | Z0      N−1 ∞ 1 N 1 h 2(n + 1) = − ( 1)n exp | k,η| d h 2 σ2 n − − σ2 | k,η| k n=0 k X   Z0   N−1 N 1 ( 1)n 1 = − − = . n n + 1 N n=0 X   Finally, this gives us

N N 2

1 È È BReq,η BReq,n = hk,η max hk,n = . R ⊇ R | |≥ n=1,...,N | | N η=1 n η=1 k=1 n _ [ o X Y n  o

2.8.24 Proof of Theorem 2.38

2 Since hk,n is Rayleigh distributed, hk,n is exponential distributed with pdf | | 2 | | 2 1 |hk,n| f 2 ( h ) = exp for k = 1, 2 and n = 1,...,N. According to |hk,n| k,n σ2 σ2 | | k,n − k,n (2.22a) and (2.22b) the maximal unidirectional relay rates are given by

∗ 1 2 2 R = log 1 + max min γ1 h1,n ,γR h2,n , 1RSeq 2 n { { | | | | }} ∗ 1 2 2 R = log 1 + max min γ2 h2,n ,γR h1,n . 2RSeq 2 n { { | | | | }} 

160 2.8 Appendix: Proofs

∗ Therefore, we can apply Lemma 2.35 to derive the pdf of RkRSeq, k = 1, 2. For a given k we consider X := h 2 and Y := h 2. To be in terms of Lemma 2.35, we define n | 1,n| n | 2,n| Zn := min γ1Xn,γRYn . Then according to Remark 2.36 the random variable Zn is again exponential{ distributed with} pdf . with 1 fZn (zn) = λk,n exp( znλk,n) λ1,n = γ σ2 + − 1 1,n 1 1 1 2 and λ2,n = 2 + 2 respectively. We consider next the random variable γRσ2,n γ2σ2,n γRσ1,n Z := max Z for which we can calculate the pdf as follows n{ n}

N N N N f (z)= f (z) F (z)= λ e−zλk,n (1 e−zλk,m ) (2.108) Z Zn Zj k,n − n=1 j=1,j6=n n=1 m=1,m6=n P Q X Y according to Lemma 2.35. Finally, we can again apply Lemma 2.35 to calculate the pdf ∗ of the random variable RkRSeq = log(1 + Z) as stated in the theorem which finishes the proof.

2.8.25 Proof of Corollary 2.39

In a scenario with independent Rayleigh distributed fading channels and for a given k we can define a random variable Z as in the proof of Theorem 2.38 with a pdf according to (2.108)

N N f (z)= λ e−zλk,n (1 e−zλk,m ) z k,n − n=1 X m=1Y,m6=n N N−1 = λ e−zλk,n 1+ ( 1)m exp( z λ ) k,n − − k,l n=1 m=1 L⊆J ,|L|=m l∈L X X Xn X  N N−1 = λ exp( zλ )+ ( 1)m exp z(λ + λ ) . k,n − k,n − − k,n k,l n=1 m=1 L⊆J ,|L|=m l∈L X X Xn X  Then the ergodic unidirectional rate is given by

N 1 ∞ λ exp(λ )E (λ ) R∗ = log(1 + z)f (z) dz = k,n k,n 1 k,n kRSeq 2 z 2 ln(2) λ 0 n=1 k,n Z X h N−1 exp(λk,n + λk,l)E1(λk,n + λk,l) + ( 1)m l∈L l∈L − Pλ + λ P m=1 k,n k,l X L⊆JXn,|L|=m l∈L i P a using the identity ∞ log(1 + t) exp( ta)dt = e E1(a) for a 0. 0 − ln(2)a ≥ R

161 2 Bidirectional Relay Communication using Superposition Encoding

In the case of iid Rayleigh fading, we have λk,n = λk for all n so that we get the pdf

N−1 N 1 f (z)= Nλ e−λkz(1 e−λkz)N−1 = Nλ − ( 1)n exp( (n + 1)λ z) z k − k n − − k n=0   X (2.109) n n n n−k k using the binomial theorem (x + y) = k=0 k x y . Then (2.52) follows using again a the identity ∞ log(1 + t) exp( ta)dt = e E1(a) for a 0. 0 − P ln(2)a  ≥ R 2.8.26 Proof of Theorem 2.40

In the case of iid Rayleigh fading, we have f (z) = Nλ e−λkz(1 e−λkz)N−1 according z k − to (2.109). By substitution of τ = 1 e−λkz we get − 1 ∞ R∗ = log(1 + z)f (z) dz kRSeq 2 z Z0 N 1 = ln 1 1/λ ln(1 τ) τ N−1 dτ. 2 ln(2) − k − Z0  Therewith, we get for any x (0, 1) ∈ N 1 R∗ ln 1 1/λ ln(1 τ) τ N−1 dτ kRSeq ≥ 2 ln(2) − k − Zx N 1 ln 1 1/λ ln(1 x) τ N−1 dτ ≥ 2 ln(2) − k − Zx 1  = ln 1 1/λ ln(1 x) (1 xN ), 2 ln(2) − k − − where we used in the first inequality that the integrand is positive and in the second that ln 1 1/λk ln(1 τ) is increasing with τ. If we set x = 1 a/N with a (0,N) we have − − − ∈  1 R∗ ln 1 1/λ ln(a/N) (1 (1 a/N)N ). (2.110) kRSeq ≥ 2 ln(2) − k − − wy  y w+y w From [AS64, 4.2.36] we have the inequality e < 1+ y for w,y > 0. Therefrom, we get with z := wy > 0 the following inequality w+y  wy w y y −y w −y z −y ez =e w+y < 1+ = = 1 = 1 y y + w − y + w − y         −z z y so that we have e > 1 y finally. With this inequality we can finally bound (2.110) so that we have −  1 R∗ > ln 1 1/λ ln(a/N) (1 e−a), kRSeq 2 ln(2) − k − 

162 2.8 Appendix: Proofs which is the proposed lower bound.

For the upper bound, accordingly for any x (0, 1) we have ∈ ln(1 1/λ ln(1 x)) x N 1 R∗ − − N τ N−1 dτ + ln 1 1/λ ln(1 τ) dτ, kRSeq ≤ 2 ln(2) 2 ln(2) − k − Z0 Zx  where we used the fact that τ N−1 takes it maximum at one. If we set x = 1 b/N with − b (0,N) we get for the first integral ∈ x b N τ N−1 dτ = xN = (1 )N < e−b − N Z0 and for the second integral (integration by parts technique)

1 1 N ln 1 1/λ ln(1 τ) dτ = ln 1+1/λ ln(N/b) +N eλk E (λ +ln(N/b)). − k − b k 1 k Z1−b/N   Let λk + ln(N/b) =: ξ, then

λk ξ N e E1(λk + ln(N/b)) = b e E1(ξ) < b ln(1 + 1/(λk + ln(N/b)))

ξ using the inequality e E1(ξ) < ln(1 + 1/ξ) [AS64, 5.1.20]. Combining all terms leads to the upper bound.

For the asymptotic lower and upper bound we have

−a R∗ log(1 + 1 ln( N )) 1−e lim inf kRSeq lim inf λk a 2 = 1 e−a > 0, N→∞ 1 N→∞ 1 2 log(ln(N)) ≥ 2 log(ln(N)) − 1 N e−b +b b 1 ∗ log(1 + ln( )) + log(1 + N ) R λk b 2 2 kRSeq λk+ln( b ) lim sup 1 lim sup 1 N→∞ 2 log(ln(N)) ≤ N→∞ 2 log(ln(N)) = e−b +b< , ∞ R∗ which meet if we choose a and b 0, i.e. lim kRSeq = 1. This means that 1 log(ln(N)) → ∞ → N→∞ 2 ∗ 1 RkRSeq is asymptotically equal to 2 log(ln(N)).

Since any ergodic sum-rate on the boundary of the ergodic rate region is larger than min R∗ and smaller than the sum 2 R∗ the ergodic rate region grows asymp- k{ kRSeq} k=1 kRSeq totically with Θ log(log(N)) as concluded in Corollary 2.42. P 

163 2 Bidirectional Relay Communication using Superposition Encoding

2.8.27 Proof of Proposition 2.43

The maximal unidirectional rates of the n-th relay node for the optimal time division case are given by

R−→ R−→ R−→ R−→ ∗ 1R,n R2,n ∗ 2R,n R1,n R1opt,n := , and R2opt,n := −→ −→ −→ −→ R1R,n + RR2,n R2R,n + RR1,n according to (2.31a) and (2.31b). Then the maximal unidirectional rate using relay selection is given by

∗ ∗ RkRSopt := max Rkopt,n k = 1, 2. (2.111) n∈{1,2,...,N}

∗ With the maximal unidirectional rates of the equal time division case R1eq,n = 1/2 min R−→ , R−→ and R∗ = 1/2 min R−→ , R−→ for the n-th relay node ac- { 1R,n R2,n} 2eq,n { 2R,n R1,n} cording to (2.22a) and (2.22b) we get

R∗ R∗ 2R∗ (2.112) keq,n ≤ kopt,n ≤ keq,n xy using the inequalities 1/2 min x, y min x, y for x,y > 0, which can be easily { } ≤ x+y ≤ { } seen from the following

1 1 1 1/2 min x, y = = min x, y . { } 2 max 1 , 1 ≤ 1 + 1 ≤ max 1 , 1 { } { x y } x y { x y } Since (2.112) holds for any n, we get R∗ R∗ 2R∗ , k = 1, 2, for (2.111). kRSeq ≤ kRSopt ≤ kRSeq Furthermore, since the inequalities hold for any channel realization, we get an upper and lower bound for the maximal unidirectional ergodic rates as follows

R∗ R∗ 2R∗ , k = 1, 2. (2.113) kRSeq ≤ kRSopt ≤ kRSeq Similar to (2.53), since is convex, we can bound the sum of any ergodic rate pair RRSTSopt R∗ (q) on the boundary of the ergodic rate region as follows RSTSopt RRSTSopt

2 ∗ ∗ R∗ q ∗ min R1RSopt, R2RSopt RSTSopt( ) 1 RkRSopt. (2.114) ≤ ≤ k=1  P Then (2.54) obviously follows from (2.113) and (2.114).

164 2.8 Appendix: Proofs

2.8.28 Proof of Theorem 2.45

Since nodes 1 and 2 cancel the interference caused by their own message before decoding the unknown messages, for the proof we have to distinguish between four possible decoding orders at nodes 1 and 2. Therefore, let the superscript R2 and R1 denote the decoding order of the unknown messages where the relay message at nodes 1 and 2 is decoded first and accord- ingly 2R and 1R where the relay messages is decoded last. For decoding the first unknown message the received signal of the second unknown message is regarded as interference. After successful decoding the nodes apply interference cancellation so that the nodes are interference-free in the second decoding step. Since [R1, R2] BR(α), there exists a fea- sible power distribution for each decoding order. Since the relay∈ R rate strictly increases with β for any decoding order, we have β = 1 β + β . R R − 1 2 We start with the decoding order R2, R1 where the relay message is decoded first, i.e. the bidirectional messages are decoded last. Since the second decoding step is interference- free we achieve the bidirectional rate −→ and −→ . R1 = (1 α)RR2(β1) R2 = (1 α)RR1(β2) Accordingly, we need for the bidirectional relay− communication the relay pow−er distribution parameters R2,R1 R2,R1 β1 := r1q2 and β2 := r2q1 R1 R2 1−α 1−α 1 1 with r1 := 2 1 0, r2 := 2 1 0, q1 := 2 > 0, and q2 := 2 > 0 − ≥ − ≥ γR|h1| γR|h2| to achieve a certain rate pair [R , R ] (α). In the first decoding step at node 1 the 1 2 ∈ RBR message m2 is unknown. Therefore, node 1 can successfully decode a relay message mR with a rate at most

R2,R1 2 β h1 γR 1 r q r q RR2,R1 := (1 α) log 1+ R | | = (1 α) log 1+ − 1 2 − 2 1 R@1 R2,R1 2 − 1+ β h1 γR − q1 + r2q1  2 | |    with βR2,R1 = 1 βR2,R1 βR2,R1. Similarly, the message m is unknown at node 2 so R − 1 − 2 1 that node 2 can successfully decode a relay message mR with a rate at most

R2,R1 2 β h2 γR 1 r q r q RR2,R1 := (1 α) log 1+ R | | = (1 α) log 1+ − 1 2 − 2 1 . R@2 R2,R1 2 − 1+ β h2 γR − q2 + r1q2  1 | |    Since both nodes have to decode the relay message only the minimum of both rates can be achieved, this means that with the decoding order R2, R1 the maximal achievable additional relay rate is given by

R2,R1 1 r1q2 r2q1 RR := (1 α) log 1+ − − . (2.115) − max q1(1 + r2), q2(1 + r1)  { } For the decoding order 2R, 1R nodes 1 and 2 decode the relay message last. Since [R , R ] 1 2 ∈ (α) there exists a feasible relay power distribution. Since the relay message m is RBR R

165 2 Bidirectional Relay Communication using Superposition Encoding unknown at nodes 1 and 2 in the first decoding step, the received signal of the relay message is regarded as interference. Therefore, for the desired bidirectional rate R1 at node 2 we have

2R,1R 2 2R,1R β1 h2 γR β1 R1 = (1 α) log 1+ | | = (1 α) log 1+ 2R,1R 2 2R,1R − 1+ β h2 γR − q2 + β  R | |   R  2R,1R 2R,1R R1 β 1 β β2 r = 2 1−α 1= 1 = − R − (2.116) ⇒ 1 − q + β 2R,1R 2 R q2 + βR β2R,1R = 1 q r β2R,1R(1 + r ), (2.117) ⇒ 2 − 2 1 − R 1 where we used β2R,1R = 1 β2R,1R β2R,1R in the last equation of (2.116). Accordingly, 1 − 2 − R for the bidirectional rate R2 at node 1 we have

2R,1R 2 2R,1R β2 h1 γR β2 R2 = (1 α) log 1+ | | = (1 α) log 1+ 2R,1R 2 2R,1R − 1+ β h1 γR − q1 + β  R | |   R  2R,1R 2R,1R R2 β 1 q2r1 β (1 + r1) r = 2 1−α 1= 2 = − − R (2.118) ⇒ 2 − 2R,1R 2R,1R q1 + βR q1 + βR 2R,1R 1 r1q2 r2q1 βR = − − , (2.119) ⇒ 1+ r1 + r2 where we used (2.117) in the last equation of (2.118). At both nodes the relay message mR is decoded in the second decoding step, which is interference-free due to the interference cancellation. Therefore, node 1 can decode the relay message if the rate is at most

R2R,1R := (1 α)log(1 + β2R,1Rγ h 2). R@1 − R R| 1| Similarly, node 2 can decode the relay message if the rate is at most

R2R,1R := (1 α)log(1 + β2R,1Rγ h 2). R@2 − R R| 2| Since both nodes should decode the relay message the largest possible relay rate for the decoding order 2R, 1R is given by

R2R,1R := min R2R,1R, R2R,1R = (1 α)log(1 + β2R,1R min γ h 2,γ h 2 ) R R@1 R@2 − R { R| 1| R| 2| } 2R,1R  2R,1R β =(1 α) log 1+ β min 1 , 1 = (1 α) log 1+ R − R { q1 q2 } − max q , q { 1 2} 1 r q r q   =(1 α) log 1+ − 1 2 − 2 1 , (2.120) − max q1(1 + r1 + r2), q2(1 + r1 + r2)  { } where we used in the last equation (2.119).

166 2.8 Appendix: Proofs

Next, we study the decoding order 2R, R1 where at node 1 the relay message is decoded last and at node 2 the relay message is decoded first. Therefore, for the interference-free second decoding step at node 2 we have 2R,R1 2R,R1 R = (1 α)R−→(β ) β = r q . (2.121) 1 − R2 1 ⇒ 1 1 2 For the decoding of message m2 at node 1 we regard the received signal of the relay message as the interference. Thus we have 2R,R1 2 2R,R1 β2 h1 γR β2 R2 = (1 α) log 1+ | | = (1 α) log 1+ 2R,R1 2 2R,R1 − 1+ β h1 γR − q1 + β  R | |   R  β2R,R1 1 β2R,R1 β2R,R1 1 r q β2R,R1 r = 2 = − 1 − R = − 1 2 − R (2.122) ⇒ 2 2R,1R 2R,1R 2R,1R q1 + βR q1 + βR q1 + βR 2R,R1 1 r1q2 r2q1 βR = − − , ⇒ 1+ r2 where we used β2R,R1 = 1 β2R,R1 β2R,R1 and (2.121) in (2.122). At node 1 the relay 1 − 2 − R message is decoded in the second interference-free decoding step so that the rate

2R,R1 2R,R1 2 1 r1q2 r2q1 RR@1 := (1 α)log(1 + βR γR h1 ) = (1 α) log 1+ − − − | | − q1(1 + r2)   is achievable. In the first decoding step at node 2 the message m1 is unknown, therefore at node 2 we can achieve the relay rate R2,R1 2 β h2 γR 1 r q r q R2R,R1 := (1 α) log 1+ R | | = (1 α) log 1+ − 1 2 − 2 1 . R@2 R2,R1 2 − 1+ β h2 γR − q2(1 + r1)(1 + r2)  1 | |    Since the message mR should be decoded at both nodes, for the decoding order 2R, R1 we have the maximal relay rate 2R,R1 2R,R1 2R,R1 RR := min RR@1 , RR@2 1 r q r q (2.123) =(1 α) log 1+ − 1 2 − 2 1 . − max q1(1 + r2), q2(1 + r1)(1 + r2)  { } Finally, we look at the decoding order R2, 1R, which is similar to the previous one. Form the bidirectional achievable rates R1 and R2 we have R2,1R R2,1R R = (1 α)R−→(β ) β = r q , 2 − R1 2 ⇒ 2 2 1 R2,1R 2 R2,1R β1 h2 γR β1 R1 = (1 α) log 1+ | | = (1 α) log 1+ R2,1R 2 R2,1R − 1+ β h2 γR − q2 + β  R | |   R  βR2,1R 1 βR2,1R βR2,1R 1 r q βR2,1R r = 1 = − 2 − R = − 2 1 − R ⇒ 1 R2,R1 R2,R1 R2,R1 q2 + βR q2 + βR q2 + βR R2,1R 1 r1q2 r2q1 βR = − − ⇒ 1+ r1

167 2 Bidirectional Relay Communication using Superposition Encoding

Accordingly, at nodes 1 and 2 we can achieve the relay rates

2R,1R 2 β h1 γR 1 r q r q RR2,1R := (1 α) log 1+ R | | = (1 α) log 1+ − 1 2 − 2 1 , R@1 2R,1R 2 − 1+ β h1 γR − q1(1 + r1)(1 + r2)  2 | |    R2,1R R2,1R 2 1 r1q2 r2q1 RR@2 := (1 α)log(1 + βR γR h2 ) = (1 α) log 1+ − − . − | | − q2(1 + r1)   This gives us the maximal achievable relay rate for the decoding order R2, 1R

R2,1R R2,1R R2,1R RR := min RR@1 , RR@2 1 r q r q (2.124) =(1 α) log 1+ − 1 2 − 2 1 . − max q1(1 + r1)(1 + r2), q2(1 + r1)  { }

Since q1, q2,r1, and r2 are non-negative we have max q (1 + r ), q (1 + r ) min max q (1 + r + r ), q (1 + r + r ) , { 1 2 2 1 }≤ { 1 1 2 2 1 2 } max q (1 + r ), q (1 + r )(1 + r ) ,  { 1 2 2 1 2 } max q (1 + r )(1 + r ), q (1 + r ) . { 1 1 2 2 1 } These are the differing denominators from (2.115), (2.120), (2.123), and (2.124) so that it directly follows that

R2,R1 2R,1R 2R,R1 R2,1R R2,R1 RR(R1, R2) := max RR , RR , RR , RR = RR . This means that the maximal achievable additional relay rate is always achieved with the decoding order where the relay message is decoded first.

2.8.29 Proof of Lemma 2.46

The graph f of the function fR : [0, RΣ] [0, RΣ] with R1 RΣ R1 denotes G RΣ Σ → 7→ − the set of non-negative rate pairs with a sum-rate equal to RΣ. Then the intersection of f BR(α) characterizes the set of rate pairs in BR(α) with the desired sum-rate RΣ G RΣ ∩ R R and is non-empty since we assume that a rate pair [R , R ] (α) with the desired 1 2 ∈ RBR sum-rate R = R + R exists. Since (α) is convex there exist R⊲ and R⊳ so that Σ 1 2 RBR 1 1 ⊲ ⊳ f BR(α)= [R1, fR (R1)] : R R1 R . G RΣ ∩ R Σ 1 ≤ ≤ 1 This means that the interval [R⊲, R⊳] characterizes all bidirectional rate pair in (α) with 1 1 RBR a sum-rate equal to R . For any R [R⊲, R⊳] we can achieve the relay rate R (R , R Σ 1 ∈ 1 1 R 1 Σ − R1) according to Theorem 2.45. From (2.56) we have

R1 RΣ−R1 2 1−α 1 2 1−α 1 β = − and β = − 1 h 2γ 2 h 2γ | 2| R | 1| R

168 2.8 Appendix: Proofs

R1 RΣ−R1 2 1−α −1 2 1−α −1 and therefore βR = 1 β1 β2 = 1 2 2 . This allows us to write − − − |h2| γR − |h1| γR R (R , R R ) as follows R 1 Σ − 1

R (R , R R ) R 1 Σ − 1 β h 2γ β h 2γ = min (1 α) log 1+ R| 1| R , (1 α) log 1+ R| 2| R − 1+ β h 2γ − 1+ β h 2γ 2| 1| R 1| 2| R n  R1 RΣ−R1  o 2 1−α 1 2 1−α 1 h 2γ h 2γ = (1 α) log 1+ 1 − − min | 1| R , | 2| R 2 2 RΣ−R1 R1 − − h2 γR − h1 γR 1−α 1−α  | | | | n2 2 o  R1 2 α 2 h1 1 1 R1 2 1− ) 1−α = (1 α) log min | R| γR + 2 + 2 2 2 , − Σ h1 h2 − h2 2 1−α | | | | :=x | |  n    :=ξ :=ˆγ =x2/ζ | {z } RΣ | {z } | 1{z−α } 2 | {z }2 1 1 1 2 1 h2 γR + + | | h 2 h 2 R1 − h 2 R1 | 1| | 2| 2 1−α | 1| 2 1−α :=ζ     o =ˆγ =1/x =1/ξ =1/x2 |{z} x|2 1{z 1 } | {z } = (1 α) log min ξ γxˆ , ζ γˆ | {z } | {z } − − ζ x − ξx2  n o :=p(x)  :=q(x)  = (1 α) log min p(x), q(x) =: R (x), − | {z } | R{z }

  ⊲ R1 where the new defined function RR(x) has the domain [xmin,xmax] with xmin := 2 1−α ⊳ R1 and x := 2 1−α . The rate R (x) is non-negative for any x [x ,x ], since max R ∈ min max we assume that a feasible bidirectional rate pair with the desired sum-rate exists. Thus min p(x), q(x) 1 for any x [x ,x ]. { }≥ ∈ min max

In Figure 2.23 we illustrate the functions p(x) and q(x) to make the following discussion clear. Since ξ and ζ are non-negative p(x)= ξ/ζ(ˆγζ x)x is a concave parabola with roots − 0, γζˆ and vertex [ˆγζ/2, γˆ2ξζ/4]. Similarly, q(1/x) = ζ/ξ(ˆγξ x)x is a concave parabola − for the inverse argument with roots 0, γξˆ and vertex [ˆγξ/2, γˆ2ξζ/4]. Therefore, q(x) has a negative pole at 0, a root at 1/γξˆ , and a vertex at [2/γξ,ˆ γˆ2ξζ/4]. Furthermore, q(x) is strictly increasing on the interval (0, 2/γξˆ ) and strictly decreasing on the interval (2/γξ,ˆ ). ∞

Since p(x), q(x) γˆ2ξζ/4 for any x (0, ) and min p(x), q(1/x) 1 for any x ≤ ∈ ∞ { } ≥ ∈ [x ,x ] = , we have 1 γˆ2ξζ/4 and therefore γζ/ˆ 2 2/γξˆ . This means that vertex min max 6 ∅ ≤ ≥ of q(x) is always to the left of the vertex of p(x). From a simple calculation it follows that

169 2 Bidirectional Relay Communication using Superposition Encoding

p(x), q(1/x), q(x)

2 γˆ ξ ζ 4 γˆ√ξ ζ 1 − ← p(x) ← q(1/x) 1

↑ q(x) γζˆ γξˆ x x x 0 qp1 pq qp2 x

γζˆ γˆ2ξζ γξˆ γˆ2ξζ 2 γˆ2ξζ Figure 2.23: Discussion of p(x), q(1/x), q(x) with vertexes [ 2 , 4 ], [ 2 , 4 ], [ ξγˆ , 4 ] respectively (not explicitly depicted). the graphs of p(x) and q(x) intersect at the following intersection points

[x ,p(x )] = [ˆγζ/2 (ˆγζ/2)2 ζ/ξ, 1], qp1 qp1 − − [x ,p(x )] = [ˆγζ/2+ p(ˆγζ/2)2 ζ/ξ, 1], qp2 qp2 − [x ,p(x )]=[ ζ/ξ, γˆp ξζ 1]. pq pq − Obviously, the first two points coincidep if we havep (ˆγζ/2)2 = ζ/ξ which is equivalent to γζ/ˆ 2 = 2/γξˆ , i.e. the vertexes of p(x) and q(x) coincide as well. From the intersection points and the vertexes it follows that p(x), q(x) 1 for x [x ,x ] only and therefore ≥ ∈ qp1 qp2 we have [x ,x ] [x ,x ] because rates are always non-negative. Finally it follows min max ⊆ qp1 qp2 that for x [x ,x ] we have ∈ min max q(x), if x x , min p(x), q(x) = ≤ pq (p(x), if x>xpq.  Moreover, min p(x), q(x) is increasing for x [x ,x ] and decreasing for x ∈ qp1 pq ∈ [x ,x ]. pq qp2  Therefore, if x [x ,x ] R⊲ R⋆ R⊳ the maximal additional relay rate R (x) pg ∈ min max ⇔ 1 ≤ 1 ≤ 1 R is attained at x at the rate pair [R⋆, R R⋆] with pg ⇔ 1 Σ − 1 R (R )= R (x ) = (1 α) log p(x ) = (1 α) log γˆ ξζ 1 R Σ R pg − pg − − RΣ = (1 α) log h h γˆ 2 2(1−α)  1 R , p  − | 1 2| − − 2 Σ  

170 2.8 Appendix: Proofs otherwise if x x R⋆ > R⊲ the maximal additional relay rate R (x) is attained at x pg max ⇔ 1 1 R max at the rate pair [R⊲, R R⊲] with ⇔ 1 Σ − 1 x2 R (R )= R (x ) = (1 α) log p(x ) (1 α) log ξ γxˆ max R Σ R max − max − max − ζ ⊳ R1    2 1 1−α ⊳ = (1 α) log h1 (ˆγ 2 2 ) RΣ + R . − | | − |h2| − 1 This finishes the proof.  

2.8.30 Proof of Proposition 2.47

For a given time division parameter α we have the broadcast rate region (1 α) RΣ = − RBC 1−α (1 α) γBC( RΣ ) with the sum-rate maximum (1 α) RΣ = R . It follows that − RBC R 1−α − 1−α Σ  for the broadcast region (1 α) (γ ) with γ = γBC RΣ the sum-rate maximum  BC R R R 1−α − R ⋆ ⋆ is attained at the rate pair (1 α) R−→(γR), R−→(γR) according to Proposition 2.2 with a − R2 R1  maximum sum-rate R . Therefore, we have to distinguish for β⋆ between three cases with Σ   respect to γR respectively RΣ. If β⋆ [0, 1], we have ∈ ⋆ ⋆ (1 α)R−→(γR) = (1 α)R−→(1 β ) − R1 − R1 − 2 1 2 |h1| = (1 α) log (1 + γR h1 + 2 ) − 2 | | |h2| 2 2 1 |h2| 2 |h1| = (1 α) log ( 2 + γR h2 + 1) 2 − 2 |h1| | | |h2| 2 2 1 |h2| 2 |h1| = (1 α) log ( 2 + γR h2 + 1) + (1 α) log 2 − 2 |h1| | | − |h2| = (1 α)R−→(β⋆) + (1 α)R†   − R2 − ⋆ † = (1 α)R−→(γR) + (1 α)R . − R2 − ⋆ ⋆ From the definitions of R1(RΣ) and R2(RΣ) it follows that R⋆(R )+ R⋆(R )=R = (1 α)R−→(β⋆) + (1 α)R−→(β⋆) 1 Σ 2 Σ Σ − R2 − R1 R⋆(R ) R⋆(R )= (1 α)R† = (1 α)R−→(β⋆) (1 α)R−→(β⋆). 1 Σ − 2 Σ − − − R2 − − R1

171 2 Bidirectional Relay Communication using Superposition Encoding

If we solve the equation system for R⋆(R ) and R⋆(R ) we have R⋆(R ) = (1 1 Σ 2 Σ 1 Σ − α)R−→(β⋆) and R⋆(R ) = (1 α)R−→(1 β⋆), which means that [R⋆(R ), R⋆(R )] R2 2 Σ − R1 − 1 Σ 2 Σ characterizes the sum-rate optimal rate pair of (1 α) RΣ . − RBC 1−α For the characterization of the case β⋆ [0, 1] we consider the now simple equivalences ∈ β⋆ 0 R−→(β⋆) 0 R (1 α)R†, ≥ ⇔ R2 ≥ ⇔ Σ ≥ − β⋆ 1 R−→(1 β⋆) 0 R (1 α)R†. ≤ ⇔ R1 − ≥ ⇔ Σ ≥− − It follows that the case β⋆ [0, 1] is equivalent to R (1 α) R† . ∈ Σ ≥ − | | Finally, it follows that if R < (1 α)R† we have β⋆ < 0 so that the sum-rate optimal rate Σ − pair is on the R -axis with [0, R ] and if R < (1 α)R† we have β⋆ > 1 so that the 2 Σ Σ − − sum-rate optimal rate pair is on the R1-axis with [0, RΣ].

2.8.31 Proof of Theorem 2.48

2 2 2 2 We prove the theorem for the case h1 h2 . The case h2 h1 follows accordingly by interchanging the indices one and| | two.≥| To| identify the| bidirectional| ≥| | rate pair where the total sum-rate maximum is attained we consider for any feasible bidirectional sum-rate RΣ max BC ∈ [0, RΣ ] the corresponding total sum-rate Rtot(RΣ). Thereby, let γB := γR (RΣ) γR ≤max denote the necessary relay signal-to-noise ratio for a bidirectional sum-rate RΣ RΣ . Effectively, this means that we have a bidirectional relay communication with reduced≤ relay γR γR power and a relay power distribution parameter β = β1 = 1 β2. Accordingly, we γB − γB can define γ := γ γ 0 which denotes the relay signal-to-noise ratio of the piggyback P R − P ≥ communication. In the following we will discuss the different cases of Rtot(RΣ).

At low sum-rates R , where we have R < min αR−→, (1 α)R† , we have R⋆(R ) < 0 Σ Σ { 2R − } 1 Σ so that the bidirectional sum-rate maximum is attained at [0, RΣ] = [0, (1 α)log(1 + 2 BC − γB h1 )] with γB = γR (RΣ). For those bidirectional sum-rates the total sum-rate is given | | RΣ by (2.64b). Since the argument of the logarithm is a concave parabola in 2 1−α , which is 1 2 maximized at its vertex, the function Rtot(RΣ) is maximized at (1 α) log 2 h1 γˆ . From ⋆ ⋆ 1 1 1 1 − | 1 | 1 R (RΣ) < 0 it follows that β = 2 2 < 0 γB + 2 < 2 . 1 2 2γB |h2| |h1| |h1|  |h2| Therefore, we have − − ⇔  2 1 2 |h1| 1 1 (1 α) log h1 γˆ = (1 α) log γR + 2 + 2 − 2 | | − 2 |h1| |h2| 2 |h1| 1 1  > (1 α) log γB + 2 + 2  − 2 |h1| |h2| 2 > (1 α) log 1+ γB h1 = RΣ.  − | | 

172 2.8 Appendix: Proofs

Since the vertex of the parabola is attained at a rate larger than RΣ it follows that Rtot(RΣ) is strictly increasing on [0, RΣ]. This implies that for this section the largest total sum-rate is attained at the largest possible bidirectional sum-rate RΣ. At higher sum-rates R , where we have R R†, we possibly have [R⋆(R ), R⋆(R )] Σ Σ ≥ 1 Σ 2 Σ ∈ BR(α) so that (2.64a) applies for Rtot(RΣ). Now, the argument of the logarithm is a R RΣ concave parabola in 2 2(1−α) which maximizes at R⋆ := 2(1 α) log 1 h h γˆ . It follows Σ − 2 | 1 2| that the function R (R ) is increasing on the interval [ R† , R⋆ ]. For the vertex at R⋆ we tot Σ | | Σ  Σ have

R (R⋆ )= R⋆ +Rmax(R⋆ ) = (1 α)(log h h γˆ 1 h h γˆ +log[ 1 h h γˆ]) = R⋆ , tot Σ Σ R Σ − | 1 2| − 2 | 1 2| 2 | 1 2| Σ max ⋆  ⋆ ⋆  ⋆ ⋆ so that we obviously have RR (RΣ) = 0. If we have [R1(RΣ), R2(RΣ)] BR(α) it ⋆ ∈ R follows that the largest total sum-rate is attained at RΣ, which is also the largest feasible bidirectional sum-rate at all. Otherwise, if we have [R⋆(R⋆ ), R⋆(R⋆ )] / (α), the 1 Σ 2 Σ ∈ RBR largest total sum-rate Rtot(RΣ) for this section is attained at the largest bidirectional sum- rate R where we have [R⋆(R ), R⋆(R )] (α). Again it follows that the largest Σ 1 Σ 2 Σ ∈ RBR feasible bidirectional sum-rate for this section maximizes Rtot(RΣ). If we further increase the sum-rate R we have R⋆ (R ) / (α). This means that the Σ BC Σ ∈ RBR total sum-rate R (R ) is given by (2.64c) if R⋆(R ) < R⊲ = R αR−→ or (2.64d) if tot Σ 1 Σ 1 Σ − 2R R⋆(R ) > R⊳ = R αR−→. In both cases the total sum-rate is independent of R and 1 Σ 1 Σ − 1R Σ therefore constant.

Since the section-wise defined function Rtot(RΣ) is continuous and increasing for rate pairs R (R ) (α) and constant for rate pairs R (R ) / (α) we achieve the max- BC Σ ∈ RBR BC Σ ∈ RBR imum total sum-rate R∗ at the largest sum-rate R where we have R⋆ (R ) (α), tot Σ BC Σ ∈ RBR which is given by the intersection point of R (R ) with the boundary of (α). BC Σ RBR

2.8.32 Proof of Corollary 2.49

In the following we prove the interchange of RR with R1 only. The interchange with R2 follows accordingly.

If we can prove the equality R (R⋆ + Rx, R⋆) = Rmax(R⋆ + R⋆) Rx for non-negative R 1 2 R 1 2 − Rx, it would follow from

⋆ ⋆ ⋆ ⋆ max ⋆ ⋆ Rtot(R1 + R2)= R1 + R2 + RR (R1 + R2) ⋆ ⋆ max ⋆ ⋆ (2.125) = R1 + Rx + R2 + RR (R1 + Rx, R2)

max ⋆ ⋆ that the total sum-rate remains constant. From Lemma 2.46 we know that RR (R1 +R2)= 2 ⋆ ⋆ ⋆ 1 1−α † ⋆ 1 1−α † † |h1| RR(R , R ) with R = RΣ R , R = RΣ + R , and R = log 2 . 1 2 1 2 − 2 2 2 2 |h2| 

173 2 Bidirectional Relay Communication using Superposition Encoding

Therewith, it follows that

⋆ ⋆ R1+Rx R2 2 1−α −1 2 1−α −1 2 1 ⋆ ⋆ 2 1 2 2 h1 γR x βR h1 γR |h2| γR |h1| γR 1−α RR@1(R1+R ,R2) − − | | 2 1= | | 2 = R⋆ − 1+ β2 h1 γR  2  2 1−α −1 2 | | 1+ 2 h1 γR |h1| γR | | 1 1 1 1 1 |h |2 R − R†+ Rx R + R† 2 1 2(1−α) Σ 2 1−α 2(1−α) Σ 2 −R† h1 γR |h |2 2 1 2 1 2 = | | − 2 − − − 1 R + 1 R† −R† 2 2(1−α) Σ 2   · 2 1 1 † 1 1 1 † R − R + Rx 2 R + R 1 2 2(1−α) Σ 2 1−α |h2| 2(1−α) Σ 2 Rx h2 γR 2 1 2 2 1 1−α | | − − − |h1| − 2 = 1 1 1 R − R† Rx 2 2(1−α) Σ 2  · 2 1−α ⋆ ⋆ R1+Rx R2 2 1−α −1 2 1−α −1 2 1 1 2 2 h2 γR 1 2 x |h2| γR |h1| γR x βR h2 γR 1−α R − − | | 1−α R = 2 ⋆ = 2 | | R +Rx 2  1  1+ β1 h2 γR 2 1−α −1 2 1+ 2 h2 γR | | |h2| γR | | 1 1 ⋆ ⋆ Rx R (R +Rx,R ) = 2 1−α 2 1−α R@2 1 2 1), (2.126) − where we used β = 1 β β and (2.56). Similarly, we can follow R − 1 − 2 ⋆ ⋆ R1+Rx R2 2 1−α −1 2 1−α −1 2 1 ⋆ ⋆ 1 2 2 h2 γR x |h2| γR |h2| γR 1−α RR@2(R1+R ,R2) − − | | 2 =1+ R⋆ R  1+ x  2 1−α −1 2 1+ 2 h2 γR |h2| γR | | ⋆ ⋆ R2 R2 2 1−α −1 2 2 1−α −1 2 1+ 1 2 h2 γR Rx 1+ 1 2 h2 γR |h2| γR |h2| γR − | | − 1−α − | | = R⋆ R = 2 R⋆  1+ x  ·  1  2 1−α 2 1−α −1 2 1+ 2 h2 γR |h2| γR | | ⋆ ⋆ R1 R2 2 1−α −1 2 1−α −1 2 Rx 1 2 2 h2 γR |h2| γR |h2| γR − 1−α − − | | = 2 1+ R⋆  ·  1  2 1−α −1 2  1+ 2 h2 γR   |h2| γR | |  R − x 1 R (R⋆,R⋆)  = 2 1−α 2 1−α R@2 1 2 . (2.127)

Then for Rx = 0 it follows from (2.126) that

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ RR@1(R1, R2)= RR@2(R1, R2)= RR(R1, R2). (2.128)

Furthermore, for Rx 0 we have R (R⋆ + Rx, R⋆) R (R⋆ + Rx, R⋆) so that we ≥ R@1 1 2 ≥ R@2 1 2

174 2.8 Appendix: Proofs can conclude

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ RR(R1 + Rx, R2) = min RR@1(R1 + Rx, R2), RR@2(R1 + Rx, R2) { ⋆ ⋆ } = RR@2(R1 + Rx, R2) (2.127) ⋆ ⋆ = R (R , R ) Rx R@2 1 2 − (2.128) ⋆ ⋆ = R (R , R ) Rx. R 1 2 − This means that (2.125) holds and therefore the total sum-rate remains constant for Rx 0. ≥ Similar arguments apply for Ry 0. ≥

2.8.33 Proof of Proposition 2.51

For π we have −→ ⋆ as well as ⋆ . This is equivalent to φBC > 2 RR2(β ) < 0 β < 0 γR < 1 1 ⋆ 2 2 2 from which it follows that R−→ = R−→(1) = log(1 + γR h1 ) < log(1 + |h2| − |h1| R1 R1 | | 1 1 2 † 1 1 ( 2 2 ) h1 )= R . Therefore, we have α1 = † > ⋆ = α0 so that |h2| |h1| R−→/R +1 R−→/R−→+1 − | | 2R 2R R1 we have = [0, α ) and = = = . A1 0 A2 A3 A4 ∅ π ⋆ 1 1 † For φBC we have β 0 γR 2 2 R−→(1) R α0 α1 so that 2 ≥ ≥ ⇒ ≥ |h2| − |h1| ⇒ R1 ≥ ⇒ ≥ we additionally have = [0, α ). A1 1 ⋆ ⋆ R−→ R−→ R−→ π 2R R1 R1 Further, for φBC > φ2Σ we have MAC < ⋆ = ⋆ † where we used 2 R −R−→ R−→ R−→−R ≥ Σ 2R R2 R1 ⋆ ⋆ ⋆ † ⋆ † ⋆ R−→ = R−→(β ) = R−→(β ) R = R−→ R , which is equivalent to 2R−→R−→ R2 R2 R1 − R1 − 2R R1 − ⋆ MAC ⋆ † † ⋆ R−→R < R−→R . If we add on both sides R−→R and divide both sides by (R−→ + R1 Σ 2R R1 R1 ⋆ R−→ † MAC † R1 R R−→)(2R−→ R + R ) we get α = ⋆ < = α so that we have 2R 2R Σ 0 R−→+R−→ 2R−→−RMAC+R† 2 − R1 2R 2R Σ =[α , α ) and = = . A2 1 0 A3 A4 ∅ On the other hand, if we have φ φ we have α α using the same arguments with 2Σ ≥ BC 0 ≥ 2 the opposite relations. It follows that =[α , α ). A2 1 2 ⋆ RMAC−R−→ R−→ Σ 1R R1 ⋆ Then, for φ φ > φ we have < ⋆ from which we get 2(R−→ + 2Σ BC Σ1 R−→ R−→ ≥ 1R R2 R1 ⋆ ⋆ MAC ⋆ ⋆ † MAC ⋆ ⋆ MAC R−→)R−→ > 2R−→R = (R−→ + R−→ R )R (R−→ + R−→)(R 2R−→ + R2 1R R2 Σ R1 R2 − Σ ⇔ R1 R2 Σ − 1R † † ⋆ ⋆ MAC ⋆ ⋆ MAC MAC R ) < R (R−→ +R−→ +R ). If we divide both side with (R−→ +R−→ +R )(R R1 R2 Σ R1 R2 Σ Σ ⋆ − R−→ † † R1 R 2R−→ + R ) we get α = ⋆ < = α so that we have =[α , α ) 1R 0 R−→+R−→ RMAC−2R−→+R† 3 3 2 0 R1 2R Σ 1R A and = . A4 ∅ Finally, if we have φ φ we have α α so that = [α , α ) and = BC ≥ 2Σ 0 ≥ 3 A3 2 3 A4 [α3, α0).

175 2 Bidirectional Relay Communication using Superposition Encoding

Then the total sum-rate optimal rate pairs follow immediately. If α we have to solve ∈ A2 R⋆(R ) = 1 R + 1−α R† = αR−→ for R and plug in the solution R = 2αR−→ (1 2 Σ 2 Σ 2 2R Σ Σ 2R − − α)R† in R⋆(R ), which gives us R = αR−→ (1 α)R†. Similarly, if α we 1 Σ 1 2R − − ∈ A4 have to solve ⋆ −→ for and plug in the solution in ⋆ , which gives us R1(RΣ) = αR1R RΣ R2(RΣ) −→ †. Finally, for we require ⋆ ⋆ MAC R2 = αR1R + (1 α)R α 3 R1(RΣ)+ R2(RΣ) = αRΣ − MAC ⋆ ∈ AMAC so that we get RΣ = αRΣ . Then RBC(αRΣ , α) specifies the optimal rate pair. opt opt With the optimal bidirectional rate pairs [R1 (α), R2 (α)] we get the maximal total sum- ∗ opt opt max opt opt rate Rtot(α) = R1 (α)+ R2 (α)+ RR (R1 (α)+ R2 (α)) using Lemma 2.46. In more detail, for time division parameters we have ⋆ −→ ⋆ ⊲ so that α 1 R1 = RR2(β ) < R1 = 0 the maximum relay rate is given by (2.60b).A Accordingly, we get the total sum-rate

α R−→ 2 1 1−α 2R Rtot(α)= αR−→ + (1 α) log h2 (ˆγ 2 2 ) 2R − | | − |h1| α α |h |2  R−→ R−→  2 1−α 2R 2 1−α 2R = (1 α) log 2 2 γˆ h1 2 for α 1. − |h1| | | − ∈A   If α we have R⋆ = Ropt(α). Since [Ropt(α), Ropt(α)] (α) we ∈ A2 ∪A3 ∪A4 1 1 1 2 ∈ RBR have R⊲ R⋆ R⊳ so that the case (2.60a) applies. This gives us in the case α with 1 ≤ 1 ≤ 1 ∈A2 R = 2αR−→ (1 α)R† Σ 2R − − α 1−α † R−→− 1 R† R (α)= αR−→ R + (1 α) log h h γˆ 2 1−α 2R 2 tot 2R − 2 − | 1 2| − α α R−→− 1 R†  R−→− 1 R†  = (1 α) log 2 1−α 2R 2 h h γˆ 2 1−α 2R 2 − | 1 2| − α α  |h |2 R−→ R−→  2 1−α 2R 2 1−α 2R  = (1 α) log 2 2 γˆ h1 2 , − |h1| | | −   1  − R† |h2| MAC where we used the equality 2 2 = . For α 3 we have to plug in RΣ = αR in |h1| ∈A Σ (2.60a) which gives us

MAC RΣ R (α)= 1 RMAC + (1 α) log h h γˆ 2 2(1−α) tot 2 Σ − | 1 2| − α RMAC α RMAC = (1 α) log 2 2(1−α) Σ h h γˆ 2 2(1−α) Σ . − | 1 2| −   Similarly, for α we have to plug in R = 2αR−→ + (1 α)R† in (2.60a) which finally ∈A4 Σ 1R − gives us

α 1−α † R−→+ 1 R† R (α)= αR−→ + R + (1 α) log h h γˆ 2 1−α 1R 2 tot 1R 2 − | 1 2| − α α |h |2 R−→  R−→  1 1−α 1R 2 1−α 1R = (1 α) log 2 2 γˆ h2 2 . − |h2| | | −   This finishes the proof. 

176 2.8 Appendix: Proofs

2.8.34 Proof of Proposition 2.52

For k = 1 we use all eigenmodes if for all λ2,n = 0 we have ξ1,n = 0. Therefore, we need σ2 6 6 a water-level ν1 > . The condition follows if we look at the power constraint in the λ2,r2 high-power regime constraint

r 2 σ2 σ2r r 1 β P = ν = r ν σ2L > 2 σ2L = σ2 2 − L . 1 R 1 − λ 2 1 − 2,r2 λ − 2,r2 λ − 2,r2−1 n=1 2,n 2,r2 2,r2 X   Similarly, beamforming is optimal if we have ξ2,2 = 0. Therefore, we need a water-level σ2 ν1 . Again the condition follows from the power constraint ≤ λ2,2 2 2 σ σ 2 β1PR = ν1 σ L2,1. − λ2,1 ≤ λ2,2 −

Finally, it is optimal to use m eigenmodes if we have ξ2,m = 0 and ξ2,m+1 = 0. Therefore, σ2 σ2 6 we need a water-level within <ν1 . From the power constraint we get λ2,m ≤ λ2,m+1 m mσ2 σ2 mσ2 σ2L <β P = ν σ2L . λ − 2,m 1 R 1 − λ ≤ λ − 2,m 2,m n=1 2,n 2,m+1 X  The case k = 2 follows accordingly.

2.8.35 Proof of Proposition 2.53

From (2.77) we have

r2 λ2,nξ2,n R−→(β ) = log det I + ρHH Q H = log 1+ R2 1 N2 2 R,1 2 σ2 n=1 Y m (β )  m (β )  1 1 λ σ2 1 1 λ ν = log 1+ 2,n (ν ) = log 2,n 1 σ2 1 − λ σ2 n=1 2,n n=1 X  X  m1(β1) β1γR + L2,m (β ) = log λ 1 1 , 2,n m (β ) n=1 1 1 X  β P +σ2L where we used in the last equality the water-level ν = 1 R 2,m1(β1) which follows from 1 m1(β1) 2 r2 m1(β1) σ 2 the power constraint β1PR = ξ2,n = ν1 = m1(β1)ν1 σ L2,m (β ). n=1 n=1 − λ2,n − 1 1 The rate R−→(β ) follows accordingly. R1 2 P P 

177 2 Bidirectional Relay Communication using Superposition Encoding

2.8.36 Proof of Theorem 2.54

For a rate pair on the boundary of MIMO we have β + β = 1. Therefore, the rate pair RBC 1 2 [R−→(β), R−→(1 β)], β [0, 1] characterizes a parametrization of the boundary. Using the R2 R1 − ∈ representation of −→ for given in Proposition 2.53 we can calculate the derivation RR2(β) β > 0 as follows

m (β) dR−→(β) 1 γ 1 m (β)γ 1 R2 = R = 1 R . dβ βγ + L ln(2) βγ + L ln(2) n=1 R 2,m1(β) R 2,m1(β) X Since −→ is continuous in we get the right hand side derivation RR2(β1) β1 = 0

dR−→(β) m (β)γ 1 γ 1 R2 = lim 1 R = R . dβ β=0 β↓0 βγR + L2,m (β) ln(2) L2,1 ln(2) 1

Similarly, for R−→(1 β) for β < 1 we can easily calculate the derivation as follows R1 −

m (1−β) dR−→(1 β) 2 γ 1 m (1 β)γ 1 R1 − = − R = − 2 − R dβ (1 β)γ + L ln(2) (1 β)γ + L ln(2) n=1 R 1,m2(1−β) R 1,m2(1−β) X − − as well as the left hand side derivation at β = 1

dR−→(1 β) m (1 β)γ 1 γ 1 R1 − = lim 2 − R = R . dβ β=1 β↑1 (1 β)γR + L1,m (1−β) ln(2) L1,1 ln(2) − 2

With this we get the angle of the normal vector ϕBC(β) of the parametrized boundary [R−→(β), R−→(1 β)], β [0, 1], from R2 R1 − ∈ γ +L R 1,M2 , if β = 0, M2L2,1 dR−→(β) dβ R2 m1(β)((1−β)γR+L1,m (1−β)) tan ϕBC(β)= =  2 , if 0 <β< 1, dR−→(1 β) dβ  m2(1−β)(βγR+L2,m (β)) R1   1 − −  M1L1,1 , if β = 1.  γR+L2,M   Obviously, θq denotes the angle of the weight vector q. Then we know from previous dis- cussion, e.g. in the proof of Theorem 2.10 in Appendix 2.8.6, that the boundary rate pair −→ −→ with a normal angle is the weighted rate sum optimal rate [RR2(β), RR1(1 β)] ϕBC(β) − MIMO pair for weight vectors q where we have θq = ϕ (β). Since is convex it follows BC RBC that ϕBC(β) decreases with increasing β.

178 2.8 Appendix: Proofs

For weight vectors q with an angle θq ϕ (0) = ϕ (β˜ ) = ϕ the intersection of the ≥ BC BC 1 1 boundary [R−→(β), R−→(1 β)] with the R -axis is optimal, this means we have β = 0. R2 R1 − 2 Thus, for θq ϕ the weighted rate sum is attained at the rate pair ≥ 1

M2 λ1,n [R−→(0), R−→(1)] = 0, log (γ + L ) R2 R1 M R 1,M2 n=1 2 h X  i according to Proposition 2.53 with m2(1) = M2.

Similarly, for weight vectors q with an angle θq ϕ (0) = ϕ (β˜ )= ϕ the intersec- ≤ BC BC M M tion of the boundary −→ −→ with the -axis is optimal. Thus, for [RR2(β), RR1(1 β)] R1 θq ϕM the weighted rate sum is attained at the− rate pair ≤

M1 λ2,n [R−→(1), R−→(0)] = log (γ + L ) , 0 R2 R1 M R 2,M1 n=1 1 h X   i according to Proposition 2.53 with m1(1) = M1.

For the characterization of the rate pair for a weight vector q with ϕM < θq < ϕ1 we need to know the number of used eigenmodes for this weight vector. The functions m1(β1) and m2(β2) characterize the number of eigenmodes for a given relay power fraction. Further- more, we know that the number of used eigenmodes change at relay power fractions β˜n, n = 1, 2,...,M so that for all β (β˜ , β˜ ] we have m (β) = m (β˜ ) and simi- ∈ n n+1 1 1 n+1 larly for all β [β˜ , β˜ ) we have m (β) = m (β˜ ). Since ϕ (β) is decreasing for β ∈ n n+1 2 2 n BC we can characterize this property also in term of the angles. Therefore, let ϕn = ϕBC(β˜n) denote the angle of the characteristic power fraction β˜n, n = 1, 2,...,M. Accordingly, for weight vectors q with angle θq [ϕ ,ϕ ) we use m (β˜ ) = η (q) eigenmodes ∈ n+1 n 1 n+1 1 of the channel H and similarly for weight vectors q with angle θq (ϕ ,ϕ ] we use 2 ∈ n+1 n m (β˜ ) = η (q) eigenmodes of the channel H . And of course, for q ϕ we use 2 n 2 1 ≥ 1 η (q) = 0 and η (q) = M as well as for q ϕ we have η (q) = M and η (q) = 0 1 2 2 ≤ M 1 1 2 eigenmodes of H1 and H2 respectively.

We are now able to characterize for a weight vector q with ϕM < θq < ϕ1 the rate pair on MIMO q1 the boundary explicitly. Therefore, we solve tan ϕBC(β) = tan θq = for β with RBC q2 0 <β< 1 which gives us the corresponding optimal power fraction β(q) as follows

q1η1(q) γR + L1,η (q) q2η2(q)L2,η (q) β(q)= 2 − 1 . γR(q2η2(q)+q1η1(q)) Then a simple calculation shows that −→ q and −→ q are given by −→ q and RR2( ) RR1( ) RR2(β( )) R−→(1 β(q)) using the representation of the rates given by Proposition 2.53. Finally, R1 − we finish the proof with the observation that the identities −→ and R1,BC([1, 0]) = RR2(1) −→ hold because we defined , . R2,BC([0, 1]) = RR1(1) Lk,0 = 0 k = 1, 2

179

3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

3.1 Introduction

We still consider a three-node network where two nodes want to communicate with each other using the support of the third node as a relay, which we call the bidirectional relay channel. Between the nodes we assume discrete memoryless channels with finite size input and output alphabets. In this chapter we present an information theoretic optimal chan- nel coding approach for the broadcast phase based on the philosophy of network coding [ACLY00] which suggests that information should not be treated as a fluid.

In classical information theory often full-duplex nodes are assumed. However, in wireless communication this assumption is hard to fulfill. Therefore, we assume half-duplex nodes which means that a node contributes either an input or an output to the channel. A natu- ral consequence of this assumption is that the relay communication is performed in phases. Often the relay communication should be integrated in existing infrastructures and most pro- tocol proposals base usually on orthogonal components which require exclusive resources for each link. As a consequence they suffer from an inherent loss in spectral efficiency. As we know from the previous, this loss can be significantly reduced if bidirectional relay com- munication is desired, since bidirectional communication can be efficiently performed in two phases. First, we have the multiple access phase where nodes 1 and 2 transmit their infor- mation to the relay node. In the succeeding broadcast phase, the relay node simultaneously forwards the information to its destinations.

Network coding is originally a distributed source coding problem. The bidirectional relaying protocols proposed in [WCK05, LJS05, FBW06, PY06, HKE+07] apply an XOR operation on the decoded data at the relay node so that they assume a source (network) and channel coding separation. The separation of network and channel coding is in general suboptimal [EMH+03, RK06]. In this thesis we consider a decode-and-forward protocol and find the optimal channel coding strategy for the bidirectional broadcast channel which factors in the distributed knowledge of the sources. But the decode-and-forward approach causes an operational separation between the phases, which means that we require that the relay node successfully decodes the messages of nodes 1 and 2 in the first phase. Furthermore, we do

181 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel not allow any feedback between the phases so that the encoders of nodes 1 and 2 cannot cooperate. In the first phase we have, due to the operational separation, the classical multiple access channel where the optimal coding strategy and capacity region are known. It remains to find the optimal coding strategy for the succeeding broadcast phase, which we call the bidirectional broadcast channel. It is important to notice that the proposed coding strategy is only optimal for the bidirectional relay channel under the restriction of the operational separation.

While for single-user channels it is of no importance whether we use vanishing average or maximal probabilities of error in the definition of the achievable rate, in a multi-terminal system the average and maximal error capacity region can be different, even in the case of asymptotically vanishing errors as shown by Dueck in [Due78]. For this reason, in this chap- ter we will pay attention to the consideration of the maximal and average error probabilities and the relation between them.

In the following two subsections we more precisely introduce the considered two-phase bidi- rectional relaying model and after that we briefly restate for completeness the multiple access channel capacity region. In Section 3.2 we prove for the bidirectional broadcast channel an optimal coding theorem and a weak converse for the maximum error probability. The proof shows that the capacity region is independent of whether we use asymptotically vanishing average or maximum probabilities of error. After we found the capacity region of the bidi- rectional broadcast channel we got aware of the work of Tuncel [Tun06] where a joint source and channel coding approach for a broadcast channel problem is studied. It seems that one can deduce the achievable rate region with respect to the average error from this work, how- ever for the bidirectional broadcast channel we do not need the Slepian-Wolf source coding part since the relay node knows which side information is known at the nodes 1 and 2. For that reason we can prove the achievable rate region for the average error probability with classical channel coding arguments only. Moreover, this allows us to derive the capacity region with respect to the maximum probability of error.

After we obtained the capacity region for each phase we optimize the time division be- tween the MAC and the BC phases. This gives us the largest achievable rate region for the discrete memoryless bidirectional relay channel using finite set alphabets with the simplifi- cations of the operational separation of the two phases. Finally, we illustrate the bidirectional achievable rate region by means of a binary channel example and finish this chapter with a discussion as well as an outlook on further results.

3.1.1 Two-Phase Bidirectional Relay Channel

We consider a three-node network with two independent information sources W1 and W2 at nodes 1 and 2. The random variables Wk, k = 1, 2, are uniformly distributed on the message

182 3.1 Introduction

Source 1 Source 2 Source 1 Source 2

WW1 MAC2 W1 BC W2

X1 Y X2 Y1 X Y2 Node 1Relay Node 2 Node 1Relay Node 2

Figure 3.1: Multiple access (MAC) and broadcast (BC) phase of a two-phase decode-and- forward bidirectional relay channel without feedback. set := 1, 2,...,M (n) , k = 1, 2. For the bidirectional channel we want the messages Wk { k } w1 1 and w2 2 to be known at node 2 and node 1, respectively. For this goal, the nodes∈ W 1 and 2 use∈ W the support of the relay node. Note, that we have no direct channel between the nodes 1 and 2 due to the half-duplex assumption and the two-phase protocol. We simplify the problem by assuming an a priori operational separation of the communi- cation into two phases. In this thesis we consider the decode-and-forward approach, which means that we require the relay node to decode the messages from nodes 1 and 2. Further- more, we do not allow cooperation between the encoders at nodes 1 and 2. Otherwise, a transmitted symbol could depend on previously received symbols. For a two-way channel this is known as a restricted two-way channel. With this simplification we end up with a multiple access phase, where the nodes 1 and 2 transmit their messages w1 and w2 to the relay node, and a broadcast phase, where the relay node forwards the messages to the nodes 2 and 1, respectively. Then the operational separation allows us to look at the two phases separately. After that we will briefly consider the optimal time division between the two phases. In the multiple access phase (MAC) we have a classical multiple access channel, where the optimal coding strategy and capacity region is known [Ahl71a, Lia72]. We will restate CMAC the capacity region in the next subsection. As before, let −→ and −→ denote the achievable R1R R2R rates between the nodes 1 and 2 and the relay node in the MAC phase. For the broadcast phase (BC) we assume that the relay node has successfully decoded the 1 messages w1 and w2 in the multiple access phase. From the union bound we know that the error probability of the two-phase protocol is at most the sum of the error probabilities of each phase. Therefore, an error-free MAC phase is reasonable if we assume rates within the MAC capacity region and a sufficient coding length. From this we end up with a broadcast channel where the message w1 is known at node 1 and the relay node and the message w2

1 È

Let È E1 and E2 denote the probabilities of event E1 and E2, then the union bound upper bounds the

È È probability˘ ¯ that at˘ least¯ one of the events happens as follows È E1 ∪ E2 ≤ E1 + E2 . ˘ ¯ ˘ ¯ ˘ ¯

183 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

is known at node 2 and the relay node as depicted in Figure 3.1. Thereby, let x1, x2, and x denote the input and y1, y2, and y the output symbols of node 1, node 2, and the relay node, respectively. Furthermore, let −→ and −→ denote the achievable rates between the relay RR1 RR2 node and the nodes 1 and 2 in the BC phase. The mission of the relay node is to broadcast a message to the nodes 1 and 2 which allows them to recover the unknown messages. This means that node 1 wants to recover message w2 and node 2 wants to recover message w1. In Section 3.2 we present an information theoretic optimal coding strategy, which gives us the capacity region of the bidirectional broadcast channel.

3.1.2 Capacity Region of the Multiple Access Phase

In this subsection, we restate the capacity region of the multiple access channel, which was independently found by Ahlswede [Ahl71a] and Liao [Lia72] and is nowadays part of any textbook on multiuser information theory [Wol78, CK81, CT91].

Definition 3.1. A discrete memoryless multiple access channel is the family p(n) : n { X1 × n n N with finite input alphabets , k = 1, 2, and a finite output alphabet where X2 → Y }n∈ Xk Y the probability transition functions are given by p(n)(yn xn,xn) := n p(y x ,x ) for | 1 2 i=1 i| i1 i2 a given probability transition function p(y x1,x2) . { | }x1∈X1,x2∈X2,y∈Y Q Theorem 3.2. The capacity region MAC with respect to a vanishing average and maximum probability of error of the memorylessC multiple access channel is the set of all rate pairs −→ −→ satisfying [R1R, R2R]

R−→ I(X ; Y X ,U), 1R ≤ 1 | 2 R−→ I(X ; Y X ,U), and 2R ≤ 2 | 1 R−→ + R−→ I(X , X ; Y U) 1R 2R ≤ 1 2 | for random variables [U, X , X ,Y ] with values in and the joint distribution 1 2 U×X1×X2×Y q(u)q (x u)q (x u)p(y x ,x ) . Furthermore, the range of the { 1 1| 2 2| | 1 2 }u∈U,x1∈X1,x2∈X2,y∈Y U auxiliary random variable U has a cardinality bounded by 2. |U| ≤

3.2 Capacity Region of the Broadcast Phase

In this section we present the capacity region of the bidirectional broadcast channel where the receiving nodes have perfect knowledge about the message which should be transmitted to the other node. This means that the independent uniformly distributed information sources

184 3.2 Capacity Region of the Broadcast Phase

W1 and W2 at the relay node are also known at node 2 and node 1 respectively. We prove the capacity region by classical channel coding principles. To this end we first introduce some standard notation.

Definition 3.3. Let and k, k = 1, 2, be finite sets, which denote the input alphabet of the relay node and theX outputY alphabet of nodes 1 and 2. A discrete memoryless broadcast channel is defined by a family p(n) : n n n N of probability transition functions { X → Y1 ×Y2 }n∈ given by p(n)(yn, yn xn) := n p(y , y x ) for a probability transition function p : 1 2 | i=1 i1 i2| i 1 2, i.e. p(y1, y2 x) is a stochastic matrix. X → Y × Y { | Q}x∈X ,y1∈Y1,y2∈Y2 In what follows we will suppress the super-index n in the definition of the n-th extension of the channel p, i.e. we will write simply p instead of p(n). This should cause no confusion since it will always be clear from the context which block length is under consideration. In addition, we will use the abbreviation := 1 2, where 1 and 2 denote the message sets. V W ×W W W (n) (n) Definition 3.4. A (M1 ,M2 ,n)-code for the bidirectional broadcast channel consists of one encoder at the relay node xn : n V→X and decoders at nodes 1 and 2

g : n 0 , 1 Y1 × W1 → W2 ∪ { } g : n 0 . 2 Y2 × W2 → W1 ∪ { } The element 0 in the definition of the decoders is included for convenience only and plays the role of an erasure symbol.

From the definition we see that we allow the decoders at nodes 1 and 2 to utilize the knowl- edge about its own message. When the relay node sends the message v = [w1,w2], the receiver of node 1 is in error if g (Y n,w ) = w . The probability of this event is denoted 1 1 1 6 2 by n n λ (v) := È g (Y ,w ) = w x (v) has been sent . 1 1 1 1 6 2 | Accordingly, we denote the probability that the receiver of node 2 is in error by

n n λ (v) := È g (Y ,w ) = w x (v) has been sent . 2 2 2 2 6 1 | n n  Hereby, Y1 and Y2 denote the random outputs at nodes 1 and 2 given that the sequence xn(v) has been sent down the channel. This allows us to introduce the notation for the maximum and average probabilities of error for the k-th node

(n) (n) 1 λk := max λk(v), and µk := |V| λk(v). v∈V v∈V P

185 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

Definition 3.5. A rate pair −→ −→ is said to be achievable for the bidirectional broad- [RR2, RR1] N (n) (n) cast channel if for any δ > 0 there is an n(δ) and a sequence of (M1 ,M2 ,n)-codes (n) ∈ (n) log M log M such that for all we have 1 −→ and 2 −→ while the n n(δ) n RR2 δ n RR1 δ ≥ (n) (n) ≥ − ≥ − maximum probabilities of error λ1 , λ2 0 when n . The set of all achievable rate pairs is the capacity region of the bidirectional→ broadcast→ channel ∞ and is denoted by . CBC Remark 3.6. Achievable rate pairs and a capacity region can be similarly defined for aver- age probability of error µ(n), µ(n) 0 when n . 1 2 → → ∞

We are now ready to present the main result of this chapter.

Theorem 3.7. The capacity region of the bidirectional memoryless broadcast channel CBC is the set of all rate pairs −→ −→ satisfying [RR2, RR1]

R−→ I(X; Y2 U), R2 ≤ | (3.1) R−→ I(X; Y U) R1 ≤ 1| for random variables [U,X,Y ,Y ] with values in and the joint probability 1 2 U×X×Y1 ×Y2 distribution q (u)q (x u)p(y , y x) . The cardinality of the range of { 1 2 | 1 2| }u∈U,x∈X ,y1∈Y1,y2∈Y2 U can be bounded by 2. |U| ≤

The theorem is proved in the following three subsections. In the first subsection we prove the achievability, i.e. a coding theorem. We prove a weak converse with respect to the maximum probability of error in the second subsection. Then the theorem is proved with the third subsection where we show that a cardinality of two is enough for the range of the auxiliary random variable.

3.2.1 Proof of Achievability

Here, we adapt the random coding proof for the degraded broadcast channel of [Ber73] to our context. First, we prove the achievability of all rate pairs −→ −→ satisfying [RR2, RR1]

R−→ I(X; Y ), and R−→ I(X; Y ), (3.2) R2 ≤ 2 R1 ≤ 1 for some probability function p(x)p(y1, y2 x). Then, we extend this to prove that all points in the closure of the convex hull of (3.2) are| achievable, which we will see is exactly the region stated in Theorem 3.7.

186 3.2 Capacity Region of the Broadcast Phase

Random codebook generation

For any δ > 0 we define for any R−→, k = 1, 2, the rate of the code R¯−→ := Rk Rk (n) (n) max 1 n(R−→ δ ) , 0 .2 Then we generate M M independent codewords Xn(v), { n ⌊ Rk − 2 ⌋ } 1 2 (n) nR¯−→ (n) nR¯−→ v = [w1,w2], of length n with M1 := 2 R2 and M2 := 2 R1 according to n i=1 p(xi). Q Encoding

To send the pair v = [w ,w ] with w , k = 1, 2, the relay sends the corresponding 1 2 k ∈ Wk codeword xn(v).

Decoding

The receiving nodes use typical set decoding. First, we characterize the decoding sets. For the decoder at node k = 1, 2 let

n n n n 1 p(yk x ) I(x ; yk ) := n log2 |n p(yk )

n n with average mutual information I(X; Y ) := E n n I(x ; y ) . This gives the decoding k x ,yk k set  R¯−→+I(X;Y ) (yn) := xn n : I(xn; yn) Rk k S k ∈X k ≥ 2   and indicator function n n n n 1, if x / (yk ), d(x , yk ) := ∈ S (0, otherwise. n n n When x (v) with v = [w1,w2] has been sent, and y1 and y2 have been received we say that the decoder at node k makes an error if either xn(v) is not in (yn) (occurring with S k probability P (1)(v)) or if at node 1 xn(w , wˆ ) with wˆ = w is in (yn) or at node 2 e,k 1 2 2 6 2 S 1 xn(w ˆ ,w ) with wˆ = w is in (yn) (occurring with P (2)(v)). If there is no or more than 1 2 1 6 1 S 2 e,k one codeword xn(w , ) (yn) or xn( ,w ) (yn), the decoders map on the erasure 1 · ∈ S 1 · 2 ∈ S 2 symbol 0.

2 ¯−→ We need not consider the trivial cases RRk = 0 for any k because then the error probability is zero by definition.

187 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

Analysis of the probability of error

From the union bound we have λ (v) P (1)(v)+ P (2)(v) with k ≤ e,k e,k

(1) n n n n Pe,k (v) := p(yk x (v)) d(x (v), yk ) for k = 1, 2 n n | yk ∈Yk P and

|W2| (2) n n n n Pe,1 (v) := p(y1 x (v)) 1 d(x (w1, wˆ2), y1 ) , n n | − y1 ∈Y1 wˆ2=1 P wˆ2P6=w2  |W1| (2) n n n n Pe,2 (v) := p(y2 x (v)) 1 d(x (w ˆ1,w2), y2 ) . n n | − y2 ∈Y2 wˆ1=1 P wˆ1P6=w1 

(m) For uniformly distributed messages W1 and W2 we define Pe,k := 1 P (m)(v) for m = 1, 2 so that µ(n) P (1) + P (2). |W1| |W2| v∈W1×W2 e,k k ≤ e,k e,k

P (n) (1) (2) E Next, we average over all codebooks and show that E n µ n P + P 0 x k ≤ x e,k e,k → as n if R−→ I(X,Y ), k = 1, 2. Recall that R¯−→ R−→ δ holds so that we → ∞ Rk ≤ k  Rk ≤ Rk −2 have

(1) 1 (1) E Exn Pe,k = xn Pe,k (v) 1 2 |W | |W | v∈W1×W2  X  for any n n n n = Exn p(yk x (v)) d(x (v), yk ) fixed v | yn∈Yn kXk  = p(xn)p(yn xn) d(xn, yn) k | k yn∈Yn xn∈X n kXk X

n n n n È = E n n d(x , y ) = d(x , y ) = 1 x ,yk k k R¯−→+I(X;Y ) n n Rk  k = È I(x ; y ) k ≤ 2   n n δ È I(x ; y ) I(X; Yk) 0 ≤ k ≤ − 4 n−→→∞   (2) exponentially fast by the law of large numbers. For the calculation of Exn Pe,k we have to distinguish between the receiving nodes. We present the analysis for k = 1, the case  k = 2 follows accordingly. Thereby, we use the fact that for v = [w ,w ] = [w , wˆ ] the 1 2 6 1 2

188 3.2 Capacity Region of the Broadcast Phase random variables p(yn Xn(v)) and d(Xn(w , wˆ ), yn) are independent for each choice of 1 | 1 2 1 yn n. 1 ∈ Y1

(2) 1 (2) E Exn Pe,1 = xn Pe,1 (v) 1 2 |W | |W | v∈W1×W2  X  |W2| for any n n n n = Exn p(y1 x (v)) 1 d(x (w1, wˆ2), y1 ) fixed v | − yn∈Yn 1 1 n wˆ2=1 o X wˆX26=w2 

|W2|

n n n n E = Exn p(y1 x (v)) xn 1 d(x (w1, wˆ2), y1 ) n n | − y1 ∈Y1 wˆ2=1 X wˆX26=w2  

|W2| n n n = p(y1 )Exn 1 d(x (w1, wˆ2), y1 ) n n − y1 ∈Y1 wˆ2=1 X wˆX26=w2 

|W2| n n n n = p(y1 ) p(x ) 1 d(x , y1 ) n n n n − y1 ∈Y1 wˆ2=1 x ∈X X wˆX26=w2 X  = ( 1) p(xn)p(yn). |W2|− 1 yn∈Yn xn∈S(yn) 1X1 X 1

n n n n n n 1 p(y1 |x ) 1 ¯ Whenever x (y1 ), we have I(x ; y1 ) = log2 n > (R−→ + I(X; Y1)) or n p(y1 ) 2 R1 ∈ S n n n n − (R¯−→+I(X;Y1)) p(y )

n (2) ¯−→ n n n − 2 (R +I(X;Y1)) E n P < p(x )p(y x )2 R1 x e,1 |W2| 1 | yn∈Yn xn∈S(yn) 1X1 X 1  n nR¯−→ − (R¯−→+I(X;Y )) 2 R1 2 2 R1 1 ≤ n (R¯−→−I(X;Y )) = 2 2 R1 1 n δ (R−→− −I(X;Y )) 2 2 R1 2 1 ≤ −nδ 2 4 0 ≤ n−→→∞ where the last inequality holds if we have R−→ I(X,Y ). Hence, if R−→ I(X,Y ), R1 ≤ 1 Rk ≤ k k = 1, 2, the average probability of error, averaged over codebooks and codewords, gets arbitrary small for sufficiently large block length n.

189 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

Code construction with arbitrary small maximum probability of error

If R−→ I(X; Y ) and R−→ I(X; Y ) for any δ > 0 and its code rate R¯−→, k = 1, 2, we R1 1 R2 2 Rk ≤ ≤ (n) (n) can choose ε > 0 and n N so that we have E n µ + µ < ε. Since the average ∈ x 1 2 probabilities of error over the codebooks is small, there exists at least one codebook ⋆ with (n) (n)  C(n) a small average probabilities of error µ1 + µ2 < ε. This implies that we have µ1 < ε (n) and µ2 < ε. We define sets := v : λ (v) < 8ε and λ (v) < 8ε , Q { ∈V 1 2 } := v : λ (v) 8ε , for k = 1, 2. Rk { ∈V k ≥ } Since ε> 1 λ (v) |Rk| 8ε, we can bound the cardinality < |V| for k = 1, 2. |V| v∈V k ≥ |V| |Rk| 8 Then from = 1 2 it follows V PQ ∪ R ∪ R > 3 . |Q| ≥ |V|−|R1|−|R2| 4 |V|

Now, let be the set of w having the property that for each w there are at least 1 M (n) T 1 1 2 2 choices of w so that [w ,w ] . Therefore, for w there are at most M (n) choices 2 1 2 ∈ Q 1 ∈ T 2 w and for w / there are less than 1 M (n) choices w such that [w ,w ] 2 ∈ W2 1 ∈ T 2 2 2 ∈ W2 1 2 ∈ . Accordingly, we have Q M (n) + 1 M (n) > > 3 M (n)M (n) |T | 2 |W1 \T| 2 2 |Q| 4 1 2 so that it follows that > 1 M (n) using = M (n) . This means that there |T | 2 1 |W1 \T| 1 −|T| exists an index set ⋆ with 1 M (n) indices w , to each of which we can find an Q1 ⊂ W1 2 1 1 index set ⋆(w ) with 1 M (n) indices w so that we have for each w ⋆ and Q2 1 ⊂ W2 2 2 2 1 ∈ Q1 w ⋆(w ) a maximum error λ (w ,w ) < 8ε, k = 1, 2. 2 ∈Q2 1 k 1 2 It follows that there exist one-to-one mappings Φ : ⋆ ⋆, Φ : ⋆ ⋆, Φw1 : V → Q 1 W1 → Q1 2 ⋆ ⋆(w ) for each w ⋆ with Φ(w ,w ) := [Φ (w ), Φw1 (w )] with sets ⋆ := W2 → Q2 1 1 ∈ Q1 1 2 1 1 2 2 V ⋆ ⋆, ⋆ := 1, 2 ..., 1 M (n) for k = 1, 2, ⋆ := [w ,w ] : w ⋆,w W1 × W2 Wk { 2 k } Q { 1 2 ∈ V 1 ∈ Q1 2 ∈ ⋆(w ) . Accordingly, there exist mappings Ψ : ⋆ ⋆, k = 1, 2, with v = Q2 1 }⊂Q k Q → Wk [Ψ1(Φ(v)), Ψ2(Φ(v))].

1 (n) 1 (n) n ⋆ n This allows us finally to define a ( 2 M1 , 2 M2 ,n)-code with an encoder x˜ : n n n ⋆ ⋆ n ⋆ V →⋆ X with x˜ (v) := x (Φ(v)) and decoders g˜1 : 1 1 2 and g˜2 : 2 2 1 with n ˜ n Yn × W →˜ W n Y × W → W g˜1(y1 ,w1) := Ψ2(w1, g1(y1 ,w1)) and g˜2(y2 ,w2) := Ψ1(g2(y2 ,w2),w2) where we use the mappings Ψ˜ : W ⋆ given by k V → k ⋆ ˜ Ψk(v), if v , Ψk(v) := ∈Q⋆ (0, if v / , ∈Q

190 3.2 Capacity Region of the Broadcast Phase for k = 1, 2. The idea is that the encoder uses only codewords xn(v) of the code ⋆ with an C index v ⋆, which have a maximum error λ (v) < 8ε, k = 1, 2. Since the decoders use ∈ Q k the typical set decoder of the code ⋆, they could erroneously find an xn(v) with v ⋆. C ∈V\Q In this case, the mapping Ψ˜ k decides on the erasure symbol 0. It was already a wrong n ⋆ decision by the decoder gk, since the encoder chooses only codewords x (v) with v . Therefore, this does not add any error to the decoding. The code has a rate pair ∈ Q

R¯−→ 1 , R¯−→ 1 = 1 n(R−→ δ ) 1 , 1 n(R−→ δ ) 1 R2 − n R1 − n n ⌊ R2 − 2 ⌋− n n ⌊ R1 − 2 ⌋− n h i h i which is element-wise larger than −→ −→ as 4 using . This [RR2 δ, RR1 δ] n > δ x x 1 proves the achievability of any rate pair satisfying− the− equation (3.2). ⌊ ⌋ ≥ −

Closure of convex hull

Let (p(x)) denote the set of rates which we can achieve with the input distribution p(x). R For k = 1, 2, we can rewrite the right hand side of (3.1) as follows

|U| |U| I(X; Yk U)= p(u)I(X; Yk U = u)= p(u)I(X; Yk) p(x|u), | u=1 | u=1

P P where in I(X; Y ) we choose a specific input distribution p(x u) according to the k p(x|u) | auxiliary random variable U. For the input distribution p(x u) we know from the first part 2 | of the proof that any rate pair Ru (p(x u)) Ê is achievable. Therefore, for any m ∈ R | ⊂ convex combination u=1 αuRu we can regard the weights as a probability mass function with p(u) := αu and u := 1, 2,...,m and choose for any u an input distribution P ∈ U { } p(x u) that achieves the rate pair Ru. For that reason, the conditional mutual informations given| by the right hand sides of (3.1) are also achievable rates.

Finally, the set of achievable rate pairs is closed by definition of achievability since for any (m) (m) sequence of achievable rate pairs with [R1, R2] = limm→∞[R1 , R2 ] the limit point itself is achievable.

In general in multi-terminal systems the average and maximal error capacity region can be different. Ahlswede has shown for the two-way channel in [Ahl71b] that “one cannot reduce a code with average errors to a code with maximal errors without an essential loss in code length or error probability, whereas for one-way channels it is unessential whether one uses average or maximal errors.” The problem in the two-way channel is to find a maximal error sub-code with a Cartesian product structure. This problem is equivalent to

191 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel a combinatorial problem by Zarankiewicz3 [Ahl71b] and arises since the transmitter and receiver have disjoint partial knowledge only. Here, the relay node has full knowledge so that for the code construction with arbitrarily small maximum probability of error we need not require a sub-code with Cartesian product structure. In the next subsection we prove the weak converse for the maximal error. Since Fano’s inequalities apply for the average error as well, the weak converse for the average error follows analogously.

3.2.2 Proof of weak converse

We have to show that any given sequence of (M (n),M (n),n)-codes with λ(n), λ(n) 1 2 1 2 → 0 must satisfy 1 log M (n) I(X; Y U) + o(n0) and 1 log M (n) I(X; Y U) + n 1 ≤ 2| n 2 ≤ 1| o(n0) for a joint probability distribution q (u)q (x u) p(y , y x). For a fixed block 1 2 | 1 2| length n we define the joint probability distribution p(w ,w ,xn, yn, yn) := 1 1 1 2 1 2 |W1| |W2| n n n n n q2(x w1,w2) i=1 p(y1i, y2i xi) on 1 2 1 2 where the conditional | n | n W × W ×X × Y × Y distribution q2(x w1,w2) = 1 if x is the codeword corresponding to w1,w2 or is equal to Q | 0 else. In what follows we consider for k = 1, 2 uniformly distributed random variables Wk with values in . Wk Lemma 3.8. For our context we have the Fano’s inequality

H(W Y n,W ) λ(n) log +1= nε(n) (3.3) 2| 1 1 ≤ 1 |W2| 1 with ε(n) = log |W2| λ(n) + 1 0 for n as λ(n) 0. 1 n 1 n → → ∞ 1 →

n Proof. From Y1 and W1 node 1 estimates the index W2 from the sent codeword n X (W1,W2). We define the event of an error at node 1 as

n 1, if g1(Y1 ,W1) = W2, E1 := n 6 (0, if g1(Y1 ,W1)= W2,

(n) (n) so that we have for the mean probability of error µ = È E = 1 λ . From the 1 1 ≤ 1 chain rule for entropies we have  H(E ,W Y n,W )= H(W Y n,W )+ H(E Y n,W ,W ) 1 2| 1 1 2| 1 1 1| 1 1 2 = H(E Y n,W )+ H(W E,Y n,W ). 1| 1 1 2| 1 1 3For an n×n matrix which contains zeros and ones only Zarankiewicz [Zar51] posed the combinatorial problem to find the smallest natural number of ones, kj (n), which ensures that a n × n matrix contains a j × j minor which consists entirely of ones. In [Ahl71b] Ahlswede generalizes the problem to find the smallest number of ones, ki,j (m, n), which ensures that a m × n matrix contains a i × j submatrix entirely of ones.

192 3.2 Capacity Region of the Broadcast Phase

Since E is a function of W ,W , and Y n, we have H(E Y n,W ,W ) = 0. Further, since 1 1 2 1 1| 1 1 2 E is a binary-valued random variable, we get H(E Y n,W ) H(E ) 1. So that finally 1 1| 1 1 ≤ 1 ≤ with the next inequality

n n H(W2 Y1 ,W1,E1)= È E1 = 0 H(W2 Y1 ,W1,E1 = 0) | | n + È E = 1 H(W Y ,W ,E = 1)  1 2| 1 1 1 (n) (n) (n) (1 µ )0 + µ log( 2 1) λ log 2 ≤ − 1 1 |W |− ≤ 1 |W | we get Fano’s inequality for our context.

Therewith, we can bound the entropy H(W2) as follows H(W )= H(W W ) 2 2| 1 = I(W ; Y n W )+ H(W Y n,W ) 2 1 | 1 2| 1 1 I(W ; Y n W )+ nε(n) ≤ 2 1 | 1 1 I(W ,W ; Y n)+ nε(n) ≤ 1 2 1 1 I(Xn; Y n)+ nε(n) ≤ 1 1 H(Y n) H(Y n Xn)+ nε(n), ≤ 1 − 1 | 1 where the equations and inequalities follow from the independence of W1 and W2, the defi- nition of mutual information, Lemma 1, the chain rule for mutual information, the positivity of mutual information, and the data processing inequality. If we divide the inequality by n we get the rate

1 H(W )= 1 H(Y n) H(Y n Xn) + ε(n) n 2 n 1 − 1 | 1 n 1 i−1  i−1 n (n) n H(Y1i Y1 ) H(Y1i Y1 , X ) + ε1 ≤ i=1 | − | n  1 P (n) n H(Y1i) H(Y1i Xi) +ε1 ≤ i=1 − | n  1P (n) = n I(Y1i; Xi)+ ε1 i=1 P using the chain rule of mutual information, the memoryless property of the channel, and the 1 definition of mutual information. A similar derivation for the source rate n H(W1) gives us n 1 1 (n) (n) log |W1| (n) 1 the bound n H(W1) n I(Y2i; Xi)+ ε2 with ε2 = n λ2 + n 0 for n ≤ i=1 → → ∞ as λ(n) 0. P 2 → This means that the entropies H(W1) and H(W2) are bounded by averages of the mutual informations calculated at the empirical distribution in column i of the codebook. Therefore,

193 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel we can rewrite these inequalities with an auxiliary random variable U, where U = i = ∈U 1, 2,...,n with probability 1 . We finish the proof of the converse with the following { } n inequalities

n 1 1 (n) n H(W2) n I(Y1i; Xi)+ ε1 ≤ i=1 n P (n) = È U = i I(Y1i; Xi U = i)+ ε1 i=1 |  (n) = IP(Y ; X U)+ ε 1U U | 1 = I(Y ; X U)+ ε(n) 1 | 1 and 1 H(W ) I(Y ; X U)+ ε(n) accordingly where ε(n) 0, k = 1, 2, when n . n 1 ≤ 2 | 2 k → → ∞ Thereby, Yk := YkU and X := XU are new random variables whose distributions depend on U in the same way as the distributions of Yki and Xi depend on i.

Up to now the auxiliary random variable U is defined on a set with arbitrary cardinality. U Next, we will show that = 2 is enough. |U|

3.2.3 Cardinality of set U

With Fenchel–Bunt’s extension of Carathéodory’s theorem it follows that any rate pair in the convex hull co (p(x)) = (p(x u)) is achievable by time-sharing between p(x) R u∈U R | two rate pairs from (p(x)), i.e. = 2 is enough. S p(x) R  S |U| S n Theorem 3.9 ([HUL01, Theorem 1.3.7]). If Ê has no more than n connected com- S ⊂ ponents (in particular, if is connected), then any x co( ) can be expressed as a convex S ∈ S combination of n elements of . S

Since for any x we have [0, 0] (p(x)), the set (p(x)) is connected. There- ∈X ∈ R p(x) R fore, any rate pair in = co (p(x)) can be expressed as a convex combination CBC p(x) R S of n = 2 rate pairs of (p(x)). p(x) R S  This finishes the proofS of the capacity region of the bidirectional broadcast channel.

Remark 3.10. Since the coding theorem includes the achievability of rate pairs in terms of the average probability of error and the proof of the weak converse for the average error works analogously, BC is also the capacity region in terms of the average probability of error. C

194 3.3 Achievable Bidirectional Rate Region

Remark 3.11. The characterization of the bidirectional broadcast capacity region for Gaus- sian channels is analogous. We would have to deal with discrete channels with Gaussian channel transfer distributions and would have to add an input power constraints but the arguments are similar to the arguments considered here.

The coding principles of the bidirectional broadcast are similar to the network coding approach with a bitwise XOR operation on the decoded messages at the relay node [WCK05, LJS05, FBW06, PY06, HKE+07]. But since network coding is originally a multi- terminal source coding problem, the achievable rates with network and channel code separa- tion in the broadcast phase using the XOR coding approach are limited by the worst receiver. This means that with a network coding approach using the XOR operation on the decoded data we can achieve in our network the rates

R−→, R−→ min I(X; Y ),I(X; Y ) R2 R1 ≤ { 1 2 } for some common input distribution p(x). The achievable rates depend on the common input distribution and both channel transfer distributions. For our coding scheme each achievable rate depends on the common input distribution and its own channel transfer distribution only. For each channel we can separately find the optimal input distribution which achieves the maximal achievable rate for this link (equal to the single link capacity), but the optimal input distribution for one channel need not be optimal for the other channel. Accordingly, we see that the network coding approach using XOR on the decoded messages at the relay node is in general inferior, but it achieves the capacity of the bidirectional broadcast if and only if for the maximizing input distribution p⋆(x) = arg max max I(X; Y ),I(X; Y ) we have I(X; Y ) = I(X; Y ). In the following p(x) { 1 2 } 1 2 we will look at the bidirectional achievable rate region.

3.3 Achievable Bidirectional Rate Region

We will now look at the achievable bidirectional rate region where we use in each phase an optimal coding strategy. Thereby, we optimize the time division between the MAC phase with memoryless multiple access channel p(y x ,x ) and BC phase with memoryless broad- | 1 2 cast channel p(y , y x). Of course, due to the a priori separation into two phases, this strat- 1 2| egy need not be the optimal strategy for the bidirectional relay channel.

Let R1 and R2 denote the achievable rates for transmitting a message w1 from node 1 to node 2 and a message w2 from node 2 to node 1 with the support of the relay node. In more detail, node 1 wants to transmit message w1 with rate nR1 in n channel uses of the bidirectional relay channel to node 2. Simultaneously, node 2 wants to transmit message w2 with rate nR in n channel uses to node 1. Then let n and n = n n denote the number 2 MAC BC − MAC

195 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel of channel uses in the MAC phase and BC phase with the property nMAC α [0, 1] and n → ∈ nBC 1 α when n , respectively. As before, we call α the time division parameter n → − → ∞ the between multiple access and broadcast phase. With a sufficient block length n (respec- tively nMAC and nBC) we can achieve a bidirectional transmission of messages w1 and w2 with arbitrary small decoding error if rate pairs −→ −→ and −→ −→ [R1R, R2R] MAC [RR2, RR1] BC exist so that we have ∈ C ∈ C

nR min n R−→,n R−→ , 1 ≤ { MAC 1R BC R2} nR min n R−→,n R−→ . 2 ≤ { MAC 2R BC R1} Thus, the achievable rate region of the bidirectional relay channel using the time division is given by the set of all rate pairs [R1, R2] which are achievable with any time division parameter α [0, 1] as n . We collect the previous consideration in the following ∈ → ∞ proposition.

Proposition 3.12. The achievable rate region BRC of the two-phase bidirectional relay channel is given by R

2 = [R , R ] Ê : R min αR−→, (1 α)R−→ , RBRC 1 2 ∈ 1 ≤ { 1R − R2} nR min αR−→, (1 α)R−→ with α (0, 1), 2 ≤ { 2R − R1} ∈ [R−→, R−→] , and [R−→, R−→] . 1R 2R ∈ CMAC R2 R1 ∈ CBC o

The region BC is in general larger than the broadcast region using superposition encoding where we additionallyC require separated information flows and XOR on the decoded data at the relay node. It follows that the achievable bidirectional rate region BRC is larger as well. R

3.4 Example with Binary Channels

Finally, we will briefly look at an example with binary channels. Therefore, we assume to have a binary erasure multiple access channel [GW75],[CT91, Example 14.3.3] in the MAC phase and two independent binary symmetric channels [Ash65, Section 3.3] in the BC phase.

Binary Erasure Multiple Access Channel

We briefly reproduce the definitions and the resulting capacity region of the binary erasure multiple access channel from [GW75] and [CT91, Example 14.3.3]. Therefore, we have

196 3.4 Example with Binary Channels

binary input alphabets 1 = 2 = 0, 1 , an output alphabet R = 0, 1,E , and transition probabilities X X { } Y { } P (0 0, 0) = 1, P (1 1, 1) = 1, YR|X1,X2 | YR|X1,X2 | P (E 0, 1) = 1, P (E 1, 0) = 1 YR|X1,X2 | YR|X1,X2 | so that we have a deterministic channel. We see that if the output of the channel is the erasure symbol E the relay node cannot uniquely determine the input. With the input distribution given by

PX1 (0) = p1, and PX2 (0) = p2, it can be easily seen that the mutual informations I(X ; Y X )= H(X ), I(X ; Y X )= 1 R| 2 1 2 R| 1 H(X2) and I(X1, X2; YR) = H(YR) are simultaneously maximized when p1 = p2 = 1/2. Then the capacity region is given by 2 = [R , R ] Ê : R 1, R 1, R + R 1.5 (3.4) CMAC 1 2 ∈ + 1 ≤ 2 ≤ 1 2 ≤ which is shown in Figure 3.2. Remark 3.13. Gaarder and Wolf introduced this binary erasure multiple access channel in [GW75] to show that a noiseless feedback for the binary erasure multiple access channel can enlarge the capacity region. Accordingly, we can use this channel with a lossless broad- cast channel to construct an example which shows that allowing cooperation between the encoders enlarges the bidirectional achievable rate region.

Binary Symmetric Broadcast Channel

The binary symmetric broadcast channel consists of two independent binary symmetric chan- nels [Ash65, Section 3.3]. For the binary symmetric broadcast channel we have binary input and output alphabets = = = 0, 1 and transition probabilities X Y1 Y2 { } P (0 0) = P (1 1) = q , and P (0 0) = P (1 1) = q , Y1|X | Y1|X | 1 Y2|X | Y2|X | 2 so that we have a symmetric channel, i.e. H(Y X) does not depend on the input distribution. k| Accordingly, the problem of maximizing I(Y X)= H(Y ) H(Y X), k = 1, 2, reduces k| k − k| to the problem of maximizing H(Yk), k = 1, 2. Then it is easy to see that if all input symbols of a symmetric channel are equally likely, the output symbols are also equally likely. Therefore, the uniform input distribution maximizes both channels simultaneously so that the broadcast capacity region for the binary symmetric channel is given by = [0, 1 H(p )] [0, 1 H(p )] (3.5) CBC − 2 × − 1 with H(p ) = p log(p ) (1 p ) log(1 p ), k = 1, 2. The capacity region k − k k − − k − k CBC is shown in Figure 3.2. Obviously, it includes the region [0, 1 max H(p ),H(p ) ] − { 1 2 } × [0, 1 max H(p ),H(p ) ] which is achievable using XOR on the decoded data at the − { 1 2 } relay node.

197 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

R 2RR R2 R1 c MAC 1 1/2

R 1/2 c 1/4 BRC BC

φ

1/2 1 R1R 1/4 1/2 R RR2 1

Figure 3.2: The left figure shows the capacity regions MAC (dotted line) and BC (dashed line), the right figure shows the correspondingC achievable rate regionC RBRC (solid line). The dashed-dotted line exemplarily shows for one angle φ the achievable rate pair ( ) on the boundary of with the optimal time divi- • RBRC sion between the two rate pairs ( ) on the boundary of and . × CMAC CBC

Achievable Bidirectional Rate Region

In Figure 3.2 we depicted the capacity regions MAC and BC and the achievable rate region with a symmetric binary erasure multipleC accessC channel, c.f. (3.4), and a binary RBRC symmetric broadcast channel, cf. (3.5). The boundary of the achievable rate region can be obtained geometrically if one takes for any angle φ [0, π/2] half of the arithmetical mean ∈ between the boundary rate pairs of the capacity regions where we have −→ −→ tan φ = R2R/R1R = −→ −→. RR1/RR2

3.5 Discussion

The proposed coding scheme follows the network coding idea and treats information flows in a network not as physical fluids. But since network coding assumes error-free links between the nodes it does not consider channel coding aspects. Due to the half-duplex assumption we will have a natural separation of the protocol into two phases. In this thesis we assume that the encoders of nodes 1 and 2 cannot cooperate and that the relay node has to decode the messages. Then the optimal coding strategy for the MAC phase is well-known. We prove an optimal coding strategy for the remaining BC phase, which gives us the capacity region for a network with the assumed simplifications. It follows that this strategy is superior to the prior

198 3.5 Discussion and Further Results coding strategies based on superposition encoding or XOR operation on the decoded data at the relay node. For a given broadcast input distribution we achieve on each link the corresponding discrete memoryless channel rate. But it is important to notice that the achievable rates are coupled by the common input distribution, which means that we cannot optimize the rates on each link separately. Then it is curious to see that if we transfer the result to scalar Gaussian channels with a mean power constraint, obviously the Gaussian input distribution will maximize both links simultaneously. However, for the vector valued Gaussian channel this is no longer the case. For the optimal input distribution we can apply the same arguments as for the MIMO MAC in Section 2.6.1. For each MIMO channel there is an optimal input distribution. This leads to two boundary rate pairs where at each rate pair one rate is maximal. Then the boundary inbetween the two rate pairs will be curved and can be calculated by convex optimization methods.

Further Results

Finally, we want briefly mention two further results which we derived in this context. The the main contribution to the the strong converse result is due to Igor Bjelakovic and to the practical coding aspects is due to Clemens Schnurr.

Strong Converse

In [BOSB07, OBSB07] we prove the strong converse for the maximum error probability and show that this implies that [ε1, ε2]-capacity region in terms of average probability of error is constant for small values of error parameters ε1 and ε2. Let (ε , ε ) denote the set of all achievable rate pairs with maximum errors less CBC,max 1 2 than ε and ε as n . Then we can prove the strong converse for the memoryless 1 2 → ∞ bidirectional broadcast channel which means that we have = (ε , ε ) for all CBC CBC,max 1 2 ε1, ε2 (0, 1). The proof is based on the blowing-up technique of Ahlswede, Gács, Körner [AGK76].∈ Therefore, we "blow-up" the decoding sets and use the Blowing-up Lemma to bound the error event in a variant of Fano’s inequality. Then we follow the line of the weak converse. Similarly, we define (ε , ε ) as the capacity region for the average errors. For suffi- CBC,av 1 2 ciently small ε1, ε2 we can construct a sub-code with bounded maximum error probability from which it follows from the strong converse for the maximum error that the corresponding rate pair has to be within . As a corollary we have that for the memoryless bidirectional CBC broadcast channel it holds that = (ε , ε ) for all [ε , ε ] (0, 1 ) (0, 1 ) or CBC CBC,av 1 2 1 2 ∈ 2 × 4 [ε , ε ] (0, 1 ) (0, 1 ). 1 2 ∈ 4 × 2

199 3 Optimal Coding Strategy for the Bidirectional Broadcast Channel

Practical Coding Aspects

The coding theorem offers a hint how to design a good practical channel code. Accordingly, in [SOS07] an interesting coset coding strategy for symmetric channels is discussed. The coding theorem suggests to design for each receiving node and for each side information one triplet a code, an encoder, and a decoder. Let E (w ) denote the code for { 1,w1 2 }w2∈W2 node 1 with side information w and similarly let E (w ) denote the code 1 ∈ W1 { 2,w2 1 }w1∈W1 for node 2 with side information w . Then the coding theorem requires that the two 2 ∈ W2 code families are interwoven so that we have E1,w1 (w2)= E2,w2 (w1) for each message pair [w ,w ] the relay wants to transmit. 1 2 ∈ W1 × W2 Then we make the observation that for symmetric channels ("channel distortion" is input independent) the cosets of the code perform as good as the original code. This suggests that we can construct the code families for each user as coset codes by simply shifting the base codes. If the two single codes base on an Ablelian additive group this leads to a simple superposition of the codewords in the group, i.e. ψ(w1,w2) = E1(w2)+ E2(w1). Then each code will perform as good as the base code. We also present a simple counter example which shows that this construction rule does not extend to non-symmetric channels.

200 4 Conclusion

Historically, information theory has played a crucial role in the development of one-way point-to-point communication. With the development of the wireless networks and the Inter- net the research focus has recently shifted to multi-terminal problems. A one-hop transmis- sion over a long distance or of a shadowed node needs high transmit power which causes a large interference for a wide range and results in a high energy consumption. Relaying pro- tocols have the potential to enhance the coverage and the throughput in wireless networks by utilizing the broadcast nature of the wireless medium. For that reason, it is common sense that relaying concepts will play a central role in future wireless communication systems.

In this thesis we study bidirectional decode-and-forward relaying which has the ability to reduce the spectral loss due to the half-duplex constraint of wireless nodes. From the half- duplex constraint the relay communication is naturally separated into two phases where the relay node either transmits or receives. The two-phase separation of the protocol has the appealing property that the bidirectional relaying protocol can be easily integrated in a con- ventional cellular network or extended to multi-hop communication as depicted in Figure 4.1 and Figure 4.2. Accordingly, we think that the study of the two-phase bidirectional decode- and-forward protocol is of great interest. We consider the optimal and fixed time division case. The optimal case is interesting on its own, while the fixed may be interesting if the bidirectional protocol should be integrated in an existing wireless network.

The scarce of radio resources and the limited energy supply of mobile nodes in wireless networks make efficient resource and power allocation strategies absolutely necessary. It is widely known that a spectrally efficient wireless network cannot be designed with a layered architecture where we optimize each layer separately. Furthermore, the performance can be substantially enhanced if we allow interaction between layers, which leads to the cross-layer design concept. In Chapter 2 we studied different cross-layer design aspects for bidirectional relaying based on the achievable rates using the superposition encoding strategy at the relay node.

From Section 2.3 we see that for the maximal throughput over a bidirectional relaying link, the optimal resource allocation not just aims for the maximal sum-rate with respect to the channel states. An optimal resource allocation policy depends on the achievable rate re- gion and factors in the traffic of the higher layers. This means that a throughput optimal

201 4 Conclusion and Future Work

M4 M4 M1 M1 BS BC BS MAC

M2 M2 MAC Bi−BC M3 M3

(a) MAC phase/cellular downlink (b) BC phase/cellular uplink

Figure 4.1: The integration of the bidirectional broadcast channel (Bi-BC) can be used for coverage extension in a cellular network, where BS denotes the basestation and Mi, i = 1, 2, 3, 4 denote the mobile terminals. Mobile M2 works as the relay node. In the cellular downlink the bidirectional relay channel works in its MAC phase, while M1 may cause interference at other nodes. In the cellular uplink the bidirectional relay channel works is in its broadcast phase (Bi-BC).

M1 M2 M3 M4 M5 MAC Bi−BC MAC

M1 M2 M3 M4 M5 Bi−BC MAC Bi−BC Figure 4.2: Bidirectional relaying can be easily extended to multi-hop communication. In the upper figure, node M1, M3, and M5 transmit and M2 and M4 receive. The signal of node M1 and M5 cause interference at nodes M4 and M2 respectively. In the lower figure, node M2 and M4 transmit and M1, M3, and M5 receive. The signal of node M2 and M4 cause interference at nodes M5 and M1 respectively. (Chain topology as proposed in [KRH+06])

202 resource allocation policy depends, of course, on the channel states but also on the load at each node. This insight has a direct consequence for the routing problem in a wireless network consid- ered in Section 2.4. While for unidirectional relay protocols we select the relay node which results in the largest achievable rate, for bidirectional protocols we have to select the relay node with respect to the achievable rate pair at which we want to operate. It is therefore a vector optimization problem. Moreover, this means that if we apply the throughput optimal policy from Section 2.3 the route we choose depends again on the channel state as well as on the load, which therefore leads to a load adaptive routing strategy. Furthermore, we see that the performance can be improved if we allow time-sharing between the usage of relay nodes. However, the scaling law of the ergodic rate region for relay nodes with iid Rayleigh fad- ing channels shows that the spatial diversity gain decreases with increasing number of relay nodes. Since in real wireless networks the channels of the relay nodes are usually not iden- tically distributed we conclude that for a practical implementation it will be sufficient to decide between a small number of preselected relay nodes. In Section 2.5 we see from the joint resource allocation for the bidirectional relaying and an additional relay multicast communication that it is always optimal to decode the relay message first. Although we specified the total sum-rate maximum for this simple problem, we see that the closed form discussion is tedious and it is probably impossible for more or more difficult routing problems. This lets us conclude that joint optimization of multiple routing tasks always improves the overall performance and makes new trade-offs possible, but it also increases the complexity of the problem. The previous insights were obtained from the discussion of single-antenna nodes, but all principles transfer to the multiple antenna case which we studied in Section 2.6. The diffi- cult optimal transmit strategy for the vector valued processing in the MIMO-MAC prevents a closed form discussion as in the scalar case. Nevertheless, multiple antennas improve the achievable rate for each link in the usual manner so that it follows that the achievable rates linearly scale in the high power regime according to the spatial degrees of the MIMO channels and the time division between the phases. In Chapter 3 we find the optimal channel coding strategy with respect to asymptotically vanishing maximal probability of error for the bidirectional broadcast channel of the bidi- rectional decode-and-forward protocol without feedback. The important improvement to the superposition coding approach in Chapter 2 is that we do not treat information as a fluid, which is in accordance with the philosophy of network coding [ACLY00]. Although we obtained the results for discrete memoryless channels with finite-size alphabets, the coding strategy can be easily transfered using standard arguments to continuous Gaussian channels with an input mean power constraint.

203 4 Conclusion and Future Work

M 1 MAC M1 Bi−BC M BS 2 BS M2

M3 M3 BC M4 M4

(a) MAC phase/cellular uplink (b) BC phase/cellular downlink

Figure 4.3: If two nodes within one cell (here M1 and M2) want to communicate with each other, the integration of the coding idea of the bidirectional broadcast channel (Bi-BC) can improve the downlink performance. Thereby, the base-station works as the relay node.

For multi-terminal channel coding problems it generally makes a difference if one considers achievable rates with respect to the average or maximal probability of error. We follow the classical strategy and extract a sub-code of essentially the same size with vanishing maxi- mal error probability from the code which suffices the average error probability condition. Thereby, we surprisingly do not rely on a Cartesian mapping of the message indexes at the relay node. This is because of the special distribution of the knowledge about the messages for the bidirectional broadcast channel. But this will cause a difference for the achievable rates if one considers channel coding for other network problems, e.g. [Ahl71b].

A more explicit discussion of the obtained results is given in Sections 2.7 and 3.5.

Future Work

Unfortunately, we obtained the optimal coding result in Chapter 3 after we have studied the cross-layer design aspects presented in Chapter 2. However, all insights, techniques, and conclusions can be transfered to the optimal coding approach. In particular, all results based on the maximal unidirectional rates will be the same. It will be future work to characterize the results explicitly.

In Figure 4.3 we present an idea how bidirectional relaying can be used to improve the performance in a cellular wireless network. If two nodes in one cell want to communicate with each other we can use the broadcast coding techniques to improve the broadcast in the downlink. In the future we will work out this example and similar networks as depicted in Figure 4.1 and Figure 4.2.

204 It follows that bidirectional relaying can be applied to cellular, ad-hoc, or hybrid networks in order to enhance the coverage or increase the overall throughput and we are sure that there are more situations where the bidirectional relaying protocol can be integrated in a meshed wireless network architecture. Moreover, we see that this will again open up new possibilities for further improvement. For example in Figure 4.1 the transmission of M1 interferes with the broadcast of the basestation so that node M1 causes additional interference at other nodes in the cell. If those regard the interference as additional information, it should be possible to improve the overall performance again. This example illustrates the potential improvement of the performance in a meshed architecture, which makes a careful study necessary. But we also see that these concepts will increase the system‘s complexity. For that reason it will be necessary to specify conditions where additional cooperation is still beneficial in a wireless system. A more closely related extension to our results is to find the optimal coding strategy if we drop the assumptions we made in Chapter 3. In particular this means that we do not require that the relay node has to decode the messages and we allow the encoders at nodes 1 and 2 to cooperate via a feedback. In some situations in this thesis we considered the averages of the achievable rates with a short-term (over a frame) average power constraint. Therefore, it would be interesting to consider adaptive resource allocation policies which take advantage of a time-varying channel as done in [KH95, GV97, TH98, BPS98]. Next, it would be interesting if we allow queueing at the relay node. Additional queueing and adaptive resource allocation policies are closely related to problems concerning the delay. For an implementation we have to re-evaluate the performance where we take into account the costs for providing the system state information at a centralized controller and/or other nodes. In accordance, for adaptive resource allocation policies it would be interesting to find decentralized decision strategies based on the local information or to develop new strategies which base on partial knowledge only. Of course, one has to answer many further questions before considering a practical imple- mentation. However, we are absolutely convinced that further studies on bidirectional relay- ing will pay off, because we think that bidirectional relaying is conceptually a wise approach. It avoids the spectral loss of two separated unidirectional relaying protocols due to the half- duplex constraint, and in addition to this it can fully exploit the network coding idea. All this lets us finally conclude that bidirectional relaying is spectrally efficient and has the potential to enhance the throughput and coverage in wireless networks.

205

References

[ACLY00] , Ning Cai, Shuo-Yen Robert Li, and Raymond W. Yeung. Network information flow. IEEE Trans. Inf. Theory, 46(4):1204–1216, July 2000.

[AGK76] Rudolf Ahlswede, P. Gács, and János Körner. Bounds on Conditional Probabil- ities with Applications in Multi-User Communication. Z. Wahrscheinlichkeit- stheorie verw. Gebiete, 34:157–177, 1976.

[AGS05] Kambiz Azarian, Hesham El Gamal, and Philip Schniter. On the achiev- able diversity–multiplexing tradeoff in half-duplex cooperative channels. IEEE Transactions on Information Theory, 51(12):4152–4172, December 2005.

[Ahl71a] Rudolf Ahlswede. Multi-way communication channels. In Proc. 2nd Int. Sym- posium on Information Theory, pages 23–52, Tsahkadsor, Armenian, USSR, September 1971.

[Ahl71b] Rudolf Ahlswede. On two-way communication channels and a problem by Zarankiewicz. In Sixth Prague Conf. on Inf. Th., Stat. Dec. Fct’s and Rand. Proc., pages 23–37. Publ. House Chechosl. Academy of Sc., September 1971.

[Ahl06] Rudolf Ahlswede. Towards a general theory of information transfer. Shan- non Lecture at ISIT in Seattle 13th July 2006, IEEE Inform. Theory Society Newsletter, 2006.

[AS64] Milton Abramowitz and Irene A. Stegun. Handbook of Mathematical Func- tions. U.S. Department of Commerce, National Bureau of Standards, Wash- ington D.C., 1964.

[Ash65] Robert B. Ash. Information Theory. Interscience Publishers, New York, 1965.

[Bam98] Nicholas Bambos. Toward power-sensitive network architectures in wireless communications: concepts, issues, and design aspects. IEEE Personal Com- munications, 5(3):50–59, June 1998.

207 References

[BCC+07] Ezio Biglieri, , Anthony Constantinides, Andrea Goldsmith, Arogyaswami Paulraj, and H. Vincent Poor. MIMO Wireless Communications. Cambridge University Press, 2007. [Ber73] Patrick P. Bergmans. Random coding theorem for broadcast channels with degraded components. IEEE Transactions on Information Theory, 19(2):197– 207, March 1973. [BJ02] Holger Boche and Eduard Jorswieck. Sum Capacity Optimization of the MIMO Gaussian MAC. In Proc. 5th Intern. Symp. On Wireless Personal Mul- timedia Communications (WPMC 2002), volume 1, pages 130–134, Honolulu, USA, October 2002. [BJH03] Holger Boche, Eduard Jorswieck, and Thomas Haustein. Channel aware scheduling for multiple antenna multiple access channels. In Proc. 37th Asilo- mar Conference on Signals, Systems, and Computers, volume 1, pages 992– 996, Monterey, USA, November 2003. [BKRL06] Aggelos Bletsas, Ashishi Khisti, David P. Reed, and Andrew Lippman. A Simple Cooperative Diversity Method Based on Network Path Selection. IEEE Journal on Selected Areas in Communications, 24(3):659–672, March 2006. [BNOP06] Helmut Bölcskei, Rohit U. Nabar, Özgür Oyman, and Arogyaswami J. Paulraj. Capacity scaling laws in MIMO relay networks. IEEE Trans. Wireless Com- munications, 5(6):1433–1444, June 2006. [BOSB07] Igor Bjelakovic, Tobias J. Oechtering, Clemens Schnurr, and Holger Boche. On the strong converse for the broadcast capacity region of two-phase bidi- rectional relaying. In Proc. IEEE Information Theory Workshop (ITW ’07), Bergen, Norway, July 2007. [BPS98] Ezio Biglieri, John Proakis, and (Shitz). Fading channels: Information-theoretic and communications aspects. IEEE Transactions on In- formation Theory, 44(6):2619–2692, October 1998. [BV04] Stephen Boyd and Lieven Vandenberghe. Convex Optimization. Cambridge University Press, 2004. [BW06] Holger Boche and Marcin Wiczanowski. Stability-optimal transmission pol- icy for the multiple antenna multiple access channel in the geometric view. EURASIP Signal Processing Journal, Special Issue on Advances in Signal Processing-assisted Cross-layer Designs, June 2006. [BW07] Holger Boche and Marcin Wiczanowski. Optimization-theoretic analysis of the stability-optimal transmission policy for multiple antenna multiple access channel. IEEE Transactions on Signal Processing, 2007. to appear.

208 References

[CG79] Thomas M. Cover and . Capacity theorems for the relay chan- nel. IEEE Transactions on Information Theory, 25(5):572–584, Sept. 1979.

[Chi04] Mung Chiang. To layer or not to layer: balancing transport and physical layers in wireless multihop networks. In Proc. 23rd IEEE Infocom, Hong Kong, March 2004.

[CK81] Imre Csiszár and János Körner. Information Theory: Coding Theorems for Discrete Memoryless Systems. Academic Press, New York, 1981.

[CK06] Thomas M. Cover and Young-Han Kim. Capacity of a class of deterministic relay channels, 2006.

[Cov75] Thomas M. Cover. Some advances in broadcast channels. Advances in Com- munication Systems, 4:229–260, 1975.

[CS03] Rene L. Cruz and Arvind V. Santhanam. Optimal routing, link scheduling and power control in multi-hop wireless networks. In Proc. 22nd IEEE Infocom, pages 702–211, San Francisco, USA, March 2003.

[CT91] Thomas M. Cover and Joy A. Thomas. Elements of Information Theory. John Wiley & Sons, Inc., New York, 1991.

[CV93] Roger S. Cheng and Sergio Verdu. Gaussian multiaccess channels with ISI: Capacity region and multiuser water-filling. IEEE Transactions on Information Theory, 39(3):773–785, May 1993.

[DK04] Zaher Dawy and Hichem Kamoun. The general gaussian relay channel: Anal- ysis and insights. In Proc. 5th Int. ITG Conf. on Source and Channel Coding, Erlangen, Germany, January 2004.

[DMM97] Mark D. Dankberg, Mark J. Miller, and Michael G. Mulligan. Self-interference cancellation for two-party relayed communication. U.S. Patent 5 596 439, Jan. 21, 1997.

[Doo53] Joseph L. Doob. Stochastic Processes. John Wiley, New York, 1953.

[DSG+03] Amir F. Dana, Masoud Sharif, Radhika Gowaikar, Babak Hassibi, and Michelle Effros. Is broadcast plus multi-access optimal for gaussian wireless networks. In Proc. Asilomar Conference on Signals, Systems, and Computers, November 2003.

[Due78] Gunter Dueck. Maximal error capacity regions are smaller than average error capacity regions for multi-user channels. Problems of Control and Information Theory, 7(1):11–19, 1978.

209 References

[EMH+03] Michelle Effros, Muriel Médard, Tracey Ho, Siddharth Ray, David Karger, and Ralf Koetter. Linear network codes: A unified framework for source, channel, and network coding. In Proc. DIMACS Workshop Networking Information Theory, Piscataway, NJ, USA, 2003.

[FBW06] Christina Fragouli, Jean-Yves Le Boudec, and Jörg Widmer. Network coding: An instant primer. SIGCOMM Comput. Commun. Rev., 36(1):63–68, 2006.

[FG98] Gerard. J. Foschini and Michael. J. Gans. On limits of wireless communica- tion in a fading environment when using multiple antennas. Wireless Personal Communications, 6:311–335, 1998.

[GA82] Abbas El Gamal and Mohammad Aref. The capacity of the semideterministic relay channel. IEEE Transactions on Information Theory, 28(3):536, May 1982.

[Gal68] Robert G. Gallager. Information Theory and Reliable Communication. John Wiley & Sons, Inc., New York, 1968.

[Gal96] Robert G. Gallager. Discrete Stochastic Processes. Kluwer Academic Pub- lishers, Boston, 1996.

[GH05] Abbas El Gamal and Navid Hassanpour. Relay-without-delay. In IEEE International Symposiom of Information Theory (ISIT), Adelaide, Australia, September 2005.

[GJJV03] Andrea Goldsmith, Syed Ali Jafar, Nihar Jindal, and Sriram Vishwanath. Ca- pacity limits of mimo channels. IEEE Journal on Selected Areas in Communi- cations, 21(5):684–702, June 2003.

[GK00] Piyush Gupta and P. R. Kumar. The capacity of wireless networks. IEEE Transactions on Information Theory, 46(2):388–404, March 2000.

[GK03] Piyush Gupta and P. R. Kumar. Towards an information theory of large net- works: An achievable rate region. IEEE Transactions on Information Theory, 49(8):1877–1894, August 2003.

[GNT06] Leonidas Georgiadis, Michael J. Neely, and Leandros Tassiulas. Resource al- location and cross-layer control in wireless networks. Foundations and Trends in Networking, 1(1):1–144, 2006.

[GV97] Andrea J. Goldsmith and Pravin P. Varaiya. Capacity of fading channels with channel side information. IEEE Transactions on Information Theory, 43(6):1986–1992, November 1997.

210 References

[GW75] N. Thomas Gaarder and Jack K. Wolf. The capacity region of a multiple-access discrete memoryless channel can increase with feedback. IEEE Transactions on Information Theory, 21(1):100–102, January 1975. [GW02] Andrea J. Goldsmith and Stephen B. Wicker. Design challenges for energy- constrained ad hoc wireless networks. IEEE Wireless Communications Maga- zine, 9(4):8–27, August 2002. [GZ05] Abbas El Gamal and Sina Zahedi. Capacity of a class of relay channels with or- thogonal components. IEEE Transactions on Information Theory, 51(5):1815– 1817, May 2005. [HD06] Christoph Hausl and Philippe Dupraz. Joint network-channel coding for the multiple-access relay channel. In Proc. of International Workshop on Wireless Ad-hoc and Sensor Networks, New York, USA, June 2006. [HH06] Christoph Hausl and Joachim Hagenauer. Iterative Network and Channel De- coding for the Two-Way Relay Channel. In Proc. IEEE Intern. Conf. on Com- munications (ICC ’06), Istanbul, Turkey, 2006. [HKE+07] Ingmar Hammerström, Marc Kuhn, Celal Esli, Jian Zhao, Armin Wittneben, and Gerhard Bauch. Mimo two-way relaying with transmit csi at the relay. In Proc. 8th IEEE Workshop on Signal Processing Advances in Wireless Commu- nications (SPAWC), Helsinki, Finland, June 2007. [HKW06] Ingmar Hammerström, Marc Kuhn, and Armin Wittneben. Distributed MIMO for cellular networks with multihop transmission protocols. In Asilomar Con- ference on Signals, Systems, and Computers 2006, oct 2006. [HM05] Simon Haykin and Michael Moher. Modern Wireless Communications. Pren- tice Hall PTR, Upper Saddle River, New Jersey, 2005. [HMZ05] Anders Host-Madsen and Junshan Zhang. Capacity bounds and power allo- cation for wireless relay channels. IEEE Transactions on Information Theory, 51(6):2020–2040, June 2005. [HN04] Todd Hunter and Aria Nosratinia. Distributed protocols for user cooperation in multi-user wireless networks. In Proc. IEEE GlobeCom, Dallas, Texas, November 2004. [HN06] Todd E. Hunter and Aria Nosratinia. Diversity through coded cooperation. IEEE Transaction on Wireless Communications, 5(2):283–289, February 2006. [HSOB05] Christoph Hausl, Frank Schreckenbach, Ioannis Oikonomidis, and Gerhard Bauch. Iterative network and channel decoding on a tanner graph. In Proc. 43rd Allerton Conference, September 2005.

211 References

[HUL01] Jean-Baptiste Hiriart-Urruty and Claude Lemaréchal. Fundamentals of Convex Analysis. Springer-Verlag, New York, 2001.

[HZF04] Patrick Herold, Ernesto Zimmermann, and Gerhard Fettweis. On the perfor- mance of cooperative amplify-and-forward relay networks. In Proc. 5th Int. ITG Conf. on Source and Channel Coding, Erlangen, Germany, January 2004.

[JOB05] Eduard A. Jorswieck, Tobias J. Oechtering, and Holger Boche. Performance Analysis of Combining Techniques with Correlated Diversity. In Proc. IEEE Wireless Communications and Networking Conference (WCNC ’05), volume 2, pages 849–854, New Orleans, USA, March 2005.

[Kat94] Randy H. Katz. Adaptation and mobility in wireless information systems. IEEE Personal Communications, 1:6–17, 1994.

[KGG05] Gerhard Kramer, Michael Gastpar, and Piyush Gupta. Cooperative strategies and capacity for relay networks. IEEE Transactions on Information Theory, 51(9):3037–3063, September 2005.

[KH95] Raymond Knopp and Pierre A. Humblet. Information capacity and power control in single-cell multiuser communications. In Proc. IEEE International Conference on Communications (ICC), pages 331–335, Seattle, WA, USA, June 1995.

[KM95] P. R. Kumar and Sean P. Meyn. Stability of queueing networks and scheduling policies. IEEE Transactions on Automatic Control, 40(2):251–260, February 1995.

[KM96] P. R. Kumar and Sean P. Meyn. Duality and linear programs for stability and performance analysis of queueing networks and scheduling policies. IEEE Transactions on Automatic Control, 41(1):4–17, January 1996.

[KM03] Ralf Koetter and Muriel Médard. An algebraic approach to network coding. IEEE/ACM Transactions on Networking, 5:782–795, October 2003.

[KRH+06] Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, and Jon Crowcroft. Xors in the air: Practical wireless network coding. In Proc. ACM SIGCOMM 2006, Pisa, Italy, September 2006.

[KSA03] Mohammad Ali Khojastepour, Ashutosh Sabharwal, and Behnaam Aazhang. On the capacity of ‘cheap´ relay networks. In Proceedings of the 37th Annual Conference on Information Sciences and Systems (CISS), March 2003.

[KSH00] , Ali H. Sayed, and Babak Hassibi. Linear Estimataion. Pren- tice Hall PTR, Upper Saddle River, New Jersey, 2000.

212 References

[LBC+05] Jianghong Luo, Rick S. Blum, Len J. Cimini, Larry J. Greenstein, and Alexan- der M. Haimovich. Link-failure probabilities for practical cooperative relay networks. In Proc. 61th-IEEE Conference on Vehicular Technology, volume 3, pages 1489–1493, Stockholm, Sweden, 2005.

[LES06] Zinan Lin, Elza Erkip, and Andrej Stefanov. Cooperative regions and partner choice in coded cooperative systems. IEEE Transactions on Communications, 54:1323–1334, July 2006.

[Lia72] Henry H. J. Liao. Multiple access channels. PhD thesis, Department of Elec- trical Engineering, University of Hawaii, Honolulu, 1972.

[LJS05] Peter Larsson, Niklas Johansson, and Kai-Erik Sunell. Coded Bi-directional Relaying. In Proc. 5th Scandinavian Workshop on Ad Hoc Networks (AD- HOC’05), Stockholm, Sweden, May 2005.

[LLG06] Lifeng Lai, Ke Liu, and Hesham El Gamal. The three-node wireless network: Achievable rates and cooperation strategies. IEEE Transactions on Informa- tion Theory, 52(3):805–828, March 2006.

[LMNM01] Emilio Leonardi, Marco Mellia, Fabio Neri, and Marco Ajmone Marsan. Bounds on average delays and queue size averages and variances in input- queued cell-based switches. In IEEE INFOCOM 2001, pages 1095–1103, An- chorage, Alaska, April 2001.

[LSS03] Ruoheng Liu, Predrag Spasojevic,´ and Emina Soljanin. User cooperation with punctured turbo codes. In Proc. Allerton Conference on Communication, Con- trol, and Computing, October 2003.

[LTW01] J. Nicholas Laneman, David N. C. Tse, and Gregory W. Wornell. An efficient protocol for realizing cooperative diversity in wireless networks. In Proc. IEEE International Symposium on Information Theory (ISIT’01), June 2001.

[LTW04] J. Nicholas Laneman, David N. C. Tse, and Gregory W. Wornell. Cooperative diversity in wireless networks: Efficient protocols and outage behavior. IEEE Transactions on Information Theory, 50(12):3062–3080, Dec. 2004.

[LV05] Yingbin Liang and Venugopal V. Veeravalli. Gaussian orthogonal relay chan- nel: optimal resource allocation and capacity. IEEE Transactions on Informa- tion Theory, 51(9):3284–3289, September 2005.

[LW03] J. Nicholas Laneman and Gregory W. Wornell. Distributed space-time coded protocols for exploiting cooperative diversity in wireless networks. IEEE Transactions on Information Theory, 49(10):2415–2425, October 2003.

213 References

[LYC03] Shou-Yen Robert Li, Raymond W. Yeung, and Ning Cai. Linear network coding. IEEE Transactions on Information Theory, 49(2):371–381, February 2003. [LZKS06] Myung J. Lee, Jianliang Zheng, Young-Bae Ko, and Deepesh Man Shrestha. Emerging standards for wireless mesh technology. IEEE Wireless Communi- cations Magazine, 13(4):56–63, April 2006. [MLMN00] Marco Ajmone Marsan, Emilio Leonardi, Marco Mellia, and Fabio Neri. On the stability of input-buffer cell switches with speed-up. In IEEE INFOCOM 2000, pages 1604–1613, Tel Aviv, Israel, March 2000. [MMAW99] Nick McKeown, Adisak Mekkittikul, Venkat Anantharam, and Jean Walrand. Achieving 100% throughput in an input-queued switch. IEEE Transactions on Communications, 47:1260–1267, August 1999. [MMMZ06] Ritesh Madan, Neelesh B. Mehta, Andreas F. Molisch, and Jinyun Zhang. Energy-Efficient Cooperative Relaying over Fading Channels with Simple Re- lay Selection. In Proc. IEEE GlobeCom, San Francisco, California, November 2006. [MMYZ06] Andreas F. Molisch, Neelesh B. Mehta, Jonathan S. Yedidia, and Jinyun Zhang. Cooperative relay networks using fountain codes. In Proc. IEEE GlobeCom, San Francisco, California, November 2006. [MO79] Albert W. Marshall and Ingram Olkin. Inequalities: Theory of Majorization and Its Applications. Academic Press, New York, 1979. [Moo65] Gordon E. Moore. Cramming more components onto integrated circuits. Elec- tronics Magazine, 38(8), April 1965. [MT93] Sean P. Meyn and Richard L. Tweedie. Markov Chains and Stochastic Stabil- ity. Springer-Verlag, London, 1993. [NBK04] Rohit U. Nabar, Helmut Bölcskei, and Felix W. Kneubühler. Fading relay channels: Performance limits and space-time signal design. IEEE Journal on Selected Areas in Communications, 22(6):1099–1109, August 2004. [Nee03] Michael J. Neely. Dynamic Power Allocation and Routing for Satellite and Wireless Networks with Time Varying Channels. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Tech- nology, Cambridge, MA, USA, 2003. [NHH04] Aria Nosratinia, Todd E. Hunter, and Ahmadreza Hedayat. Cooperative com- munication in wireless networks. IEEE Communications Magazine, 42:68–73, October 2004.

214 References

[NMR03] Michael J. Neely, Eytan Modiano, and Charles E. Rohrs. Power Allocation and Routing in Multibeam Satellites with Time-Varying Channels. IEEE/ACM Transactions on Networking, 11(1):138–152, February 2003. [NMR05] Michael J. Neely, Eytan Modiano, and Charles E. Rohrs. Dynamic Power Allocation and Routing for Time-Varying Wireless Networks. IEEE Journal on Selected Areas in Communications, 23(1):89–103, January 2005. [OB03a] Tobias J. Oechtering and Holger Boche. On the Capacity of a Distributed Mul- tiantenna System using Cooperative Transmitters. In Proc. 57th IEEE Semian- nual Vehicular Techn. Conf. (VTC ’03), volume 1, pages 75–79, Jeju, Korea, April 2003. [OB03b] Tobias J. Oechtering and Holger Boche. Optimality Range of Transmission over Different Terminals in Cooperative Multiantenna Systems. In Proc. IEEE Intern. Conf. on Acoustics Speech and Signal Processing (ICASSP ’03), vol- ume 4, pages 365–368, Hong Kong, April 2003. [OB05] Tobias J. Oechtering and Holger Boche. Capacity of a Gaussian FIR Linear Relay Network. In Proc. WirelessCom 2005, Maui, Hawaii, USA, June 2005. [OB06a] Tobias J. Oechtering and Holger Boche. Bidirectional Regenerative Half- duplex Relaying using Relay Selection. IEEE Transactions on Wireless Com- munications, 2006. accepted. [OB06b] Tobias J. Oechtering and Holger Boche. Optimal Resource Allocation for a Bidirectional Regenerative Half-duplex Relaying. In Proc. IEEE Interna- tional Symposium on Information Theory and its Applications, pages 528 – 533, Seoul, Korea, 2006. [OB06c] Tobias J. Oechtering and Holger Boche. Piggyback a Common Message on Half-Duplex Bidirectional Relaying. IEEE Transactions on Wireless Commu- nications, 2006. revised. [OB06d] Tobias J. Oechtering and Holger Boche. Stability Region of an Efficient Bidi- rectional Regenerative Half-duplex Relaying Protocol. In IEEE Information Theory Workshop (ITW 06) , pages 380–384, Chengdu, China, October 2006. [OB06e] Tobias J. Oechtering and Holger Boche. Stability Region of an Optimized Bidirectional Regenerative Half-duplex Relaying Protocol. IEEE Transaction on Communications, 2006. accepted. [OB07a] Tobias J. Oechtering and Holger Boche. Bidirectional Relaying using Inter- ference Cancellation. In Proc. ITG/IEEE International Workshop on Smart Antennas (WSA ’07), Vienna, Austria, February 2007.

215 References

[OB07b] Tobias J. Oechtering and Holger Boche. Optimal Time-Division for Bidirec- tional Relaying using Superposition Encoding. IEEE Communications Letter, 2007. submitted. [OB07c] Tobias J. Oechtering and Holger Boche. Optimal Transmit Strategies in Multi- Antenna Bidirectional Relaying. In Proc. IEEE Intern. Conf. on Acoustics, Speech, and Signal Processing (ICASSP ’07), Honolulu, Hawaii, USA, April 2007. [OB07d] Tobias J. Oechtering and Holger Boche. Piggyback a Common Message on Bidirectional Relaying. In Proc. Workshop on Wireless Networks - Communi- cation, Cooperation and Competition (WNC3-’07), 2007. [OB07e] Tobias J. Oechtering and Holger Boche. Relay Selection in Bidirectional Relay Communication. In Proc. 8th IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Helsinki, Finland, June 2007. [OBSB07] Tobias J. Oechtering, Igor Bjelakovic, Clemens Schnurr, and Holger Boche. Broadcast Capacity Region of Two-Phase Bidirectional Relaying. IEEE Transactions on Information Theory, 2007. submitted, available at http://arxiv.org/abs/cs.IT/0703078. [OLT07] Ayfer Özgür, Olivier Lévêque, and . Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Transactions on Information Theory, page to appear, December 2007. [OS04] Tobias J. Oechtering and Aydin Sezgin. A new Cooperative Transmission Scheme using the Space-Time Delay Code. In Proc. ITG Workshop on Smart Antennas, Munich, Germany, March 2004. [OSB06] Tobias J. Oechtering, Benjamin Schubert, and Holger Boche. FIR Linear Relay Network with Frequency Selective Channels. In Proc. IEEE Intern. Conf. on Communications (ICC ’06), Istanbul, Turkey, 2006. [OSBB07] Tobias J. Oechtering, Clemens Schnurr, Igor Bjelakovic, and Holger Boche. Achievable Rate Region of a Two Phase Bidirectional Relay Channel. In Pro- ceedings of the 41st Annual Conference on Information Sciences and Systems, March 2007. [PP02] Athanasios Papoulis and S. Unnikrishna Pillai. Probability, Random Variables and Stochastic Processes. McGraw-Hill Book Company, New York, 4. edition, 2002. [PY06] Petar Popovski and Hiroyuki Yomo. The anti–packets can increase the achiev- able throughput of a wireless multi–hop network. In Proc. IEEE International Conference on Communications (ICC), Istanbul, Turkey, June 2006.

216 References

[Rap96] Theodore S. Rappaport. Wireless Communications. Prentice Hall, Englewood Cliffs, New Jersey, 1996.

[RK06] Niranjan Ratnakar and Gerhard Kramer. The multicast capacity of determin- istic relay networks with no interference. IEEE Transactions on Information Theory, 52(6):2425–2432, June 2006.

[RU95] Bixio Rimoldi and Rüdiger Urbanke. A rate-splitting approach to the gaus- sian multiple access channel. IEEE Transactions on Information Theory, 42(2):364–375, February 1995.

[Rud66] Walter Rudin. Real and Complex Analysis. McGraw Hill Book Company, 1966.

[RW05a] Boris Rankov and Armin Wittneben. Spectral efficient protocols for nonregen- erative half-duplex relaying. In Proc. 43rd Allerton Conference, September 2005.

[RW05b] Boris Rankov and Armin Wittneben. Spectral efficient signaling for half- duplex relay channels. In Proc. Asilomar Conference on Signals, Systems, and Computers, November 2005.

[RW06] Boris Rankov and Armin Wittneben. Achievable rate regions for the two-way relay channel. In Proc. IEEE Int. Symposium on Information Theory (ISIT), jul 2006.

[RW07] Boris Rankov and Armin Wittneben. Spectral efficient protocols for half- duplex fading relay channels. IEEE Journal on Selected Areas in Commu- nications, feb 2007.

[SE04] Andrej Stefanov and Elza Erkip. Cooperative coding for wireless networks. IEEE Transactions on Communications, 52:1470–1476, September 2004.

[SE05] Andrej Stefanov and Elza Erkip. Cooperative space–time coding for wireless networks. IEEE Transactions on Communications, 53:1804–1809, November 2005.

[SEA98] Andrew Sendonaris, Elza Erkip, and Behnaam Aazhang. Increasing uplink capacity via user cooperation diversity. In Proc. IEEE International Sympo- sium on Information Theory (ISIT’98), page 156, Cambridge, MA, USA, Aug. 1998.

[SEA03a] Andrew Sendonaris, Elza Erkip, and Behnaam Aazhang. User cooperation diversity - Part I: System description. IEEE Transactions on Communications, 51:1927–1938, November 2003.

217 References

[SEA03b] Andrew Sendonaris, Elza Erkip, and Behnaam Aazhang. User cooperation diversity - Part II: Implementation aspects and performance analysis. IEEE Transactions on Communications, 51:1939–1948, November 2003. [SG00] Brett Schein and Robert G. Gallager. The gaussian parallel relay network. In Proc. IEEE International Symposium on Information Theory (ISIT’00), page 22, Sorrento, Italy, June 2000. [Sha48] Claude E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379–423 and 623–656, Jul and Oct 1948. [Sha61] Claude E. Shannon. Two-way communication channel. In Proc. 4th Berkeley Symp. Math Stat. and Prob., volume 1, pages 611–644, 1961. [SHMX06] Vladimir Stankovic, Anders Host-Madsen, and Zixiang Xiong. Cooperative di- versity for wireless ad hoc networks. IEEE Communications Magazine, 23:37– 49, September 2006. [SO04a] Aydin Sezgin and Tobias J. Oechtering. A new resource efficient transmission scheme for Cooperative Systems. In Proc. IEEE Intern. Workshop on Sig- nal Processing Advances for Wireless Communications (SPAWC ’04), Lisboa, Portugal, July 2004. [SO04b] Aydin Sezgin and Tobias J. Oechtering. Antenna Selection with Capacity- Approaching Space-Time Block Codes. In Proc. IEEE Asilomar Conf. on Sig- nals, Systems, and Computers, Pacific Grove, CA, USA, November 2004. [SO04c] Aydin Sezgin and Tobias J. Oechtering. Complete Characterization of the Equivalent MIMO Channel for Quasi-Orthogonal Space-Time Codes. IEEE Transactions on Information Theory, 2004, December 2004. submitted. [SO04d] Aydin Sezgin and Tobias J. Oechtering. On the Outage Probability of Quasi- Orthogonal Space-Time Codes. In Proc. IEEE Information Theory Workshop (ITW ’04), San Antonio, Texas, October 2004. [SOS07] Clemens Schnurr, Tobias J. Oechtering, and Slawomir Stanczak.´ On coding for the broadcast phase in the two-way relay channel. In Proceedings of the 41st Annual Conference on Information Sciences and Systems, 2007. [SRK03] Sanjay Shakkottai, Theodore S. Rappaport, and Peter C. Karlsson. Cross-layer design for wireless networks. IEEE Communications Magazine, 41(10):74–80, October 2003. [SWB06] Slawomir Stanczak,´ Marcin Wiczanowski, and Holger Boche. Resource Allo- cation in Wireless Networks - Theory and Algorithms. Lecture Notes in Com- puter Science (LNCS 4000). Springer-Verlag, 2006.

218 References

[TCHC06] Taiwen Tang, Chan-Byoung Chae, Robert W. Health, and Sunghyun Cho. On achievable sum rates of a multiuser mimo relay channel. In Proc. IEEE Int. Symposium on Information Theory (ISIT), jul 2006.

[TE92] Leandros Tassiulas and Anthony Ephremides. Stability properties of con- strained queueing systems and scheduling systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Transactions on Au- tomatic Control, 37(12):1936–1948, 1992.

[TE93] Leandros Tassiulas and Anthony Ephremides. Dynamic server allocation to parallel queues with randomly varying connectivity. IEEE Transactions on Information Theory, 39(2):466–478, 1993.

[TE02] Anthony Ephremides Tamer ElBatt. Joint scheduling and power control for wireless ad-hoc networks. In Proc. 21st IEEE Infocom, New York, NY, USA, June 2002.

[Tel99] Imre E. Telatar. Capacity of multi-antenna gaussian channels. European Trans- actions on Telecommunications, 10(6):585–595, Nov./Dec 1999.

[TG95] Imre E. Telatar and Robert G. Gallager. Combining Queueing Theory with In- formation Theory with Mulitaccess. IEEE Journal on Selected Areas in Com- munications, 13(6):963–969, August 1995.

[TH98] David N. C. Tse and Stephen V. Hanly. Multiaccess Fading Channels–Part I: Polymatroid Structure, Optimal Resource Allocation and Throughput Capac- ities. IEEE Transactions on Information Theory, 44:2796–2815, November 1998.

[Tsy65] Boris S. Tsybakov. The capacity of a memoryless gaussian vector channel. Problems of Information Transmission, 1(1):18–29, 1965.

[Tun06] Ertem Tuncel. Slepian–wolf coding over broadcast channels. IEEE Trans. Inf. Theory, 52(4):1469–1482, April 2006.

[TV05] David N. C. Tse and Pramod Viswanath. Fundamentals of Wireless Commu- nication. Cambridge University Press, June 2005.

[vdM71] Edward C. van der Meulen. Three-terminal communication channels. Adv. Appl. Prob., 3:120–154, Sept. 1971.

[VJG03] Sriram Vishwanath, Nihar Jindal, and Andrea Goldsmith. Duality, achiev- able rates, and sum-rate capacity of gaussian mimo broadcast channels. IEEE Transactions on Information Theory, 49(10):2658–2668, October 2003.

219 References

[WB04] Marcin Wiczanowski and Holger Boche. Optimal Transmit Covariance Ma- trices for MIMO High Speed Uplink Packet Access. In Proc. IEEE Wireless Communications and Networking Conference (WCNC 2004), volume 2, pages 771–776, Atlanta, USA, March 2004.

[WCK05] Yunnan Wu, Philip A. Chou, and S. Y. Kung. Information exchange in wire- less networks with network coding and physical-layer broadcast. In Proc. 39th Conference on Information Sciences and Systems, Baltimore, MD, USA, March 2005.

[Wil82] Frans M. J. Willems. Informationtheoretical results for the discrete mem- oryless multiple access channel. Doctor in Wetenschappen Proefschrift, Katholieke Univeriteit Leuven, Belgium, 1982.

[Wol78] Jacob Wolfowitz. Coding Theorems of Information Theory. Springer-Verlag, Berlin, 3. edition, 1978.

[WR03] Armin Wittneben and Boris Rankov. Impact of cooperative relays on the ca- pacity of rank-deficient mimo channels. In in Proc. 12th IST Summit on Mobile Wireless Communications, Aveiro, Portogal, June 2003.

[Wyn74] Aaron D. Wyner. Recent Results in the Shannon Theory. IEEE Transactions on Information Theory, 20(1):2–10, January 1974.

[WZHM05] Bo Wang, Junshan Zhang, and Anders Host-Madsen. On the capacity of mimo relay channels. IEEE Transactions on Information Theory, 51(1):29–43, Jan- uary 2005.

[XJB04] Lin Xiao, Mikael Johansson, and Stephen Boyd. Simultaneous routing and resource allocation via dual decomposition. IEEE Transactions on Communi- cations, 52:1136–1144, July 2004.

[XK04] Liang-Liang Xie and P. R. Kumar. A network information theory for wireless communication: Scaling law and optimal operation. IEEE Transactions on Information Theory, 50(5):748–767, May 2004.

[XK07] Liang-Liang Xie and P. R. Kumar. Multi-source, multi-destination, multi-relay wireless networks. IEEE Transactions on Information Theory, page to appear, October 2007.

[YB05] Edmund M. Yeh and Randall Berry. Throughput Optimal Control of Coopera- tive Relay Networks. In IEEE International Symposium of Information Theory (ISIT), Adelaide, Australia, September 2005.

220 References

[YE06] Melda Yuksel and Elza Erkip. Diversity-multiplexing tradeoff in cooperative wireless systems. In Proceedings of the 40th Annual Conference on Informa- tion Sciences and Systems (CISS), Princeton, March 2006. [Yeu95] Raymond W. Yeung. Multilevel diversity coding with distortion. IEEE Trans- actions on Information Theory, 41(3):412–422, March 1995. [Yeu02] Raymond W. Yeung. A First Course in Information Theory. Springer-Verlag, New York, 2002. [Yeu05] Raymond W. Yeung. Network Coding Theory Part I/II: Single/Multiple Source. Foundations and Trends in Communications and Information Theory, 2(4–5):241–381, 2005. [YRBC01] Wei Yu, Wonjong Rhee, Stephen Boyd, and John M. Cioffi. Iterative water- filling for gaussian vector multiple access channels. In IEEE International Symposium on Information Theory (ISIT’01), Washington, DC, USA, June 2001. [ZAL06] Yi Zhao, Raviraj Adve, and Teng Joon Lim. Improving amplify-and-forward relay networks: Optimal power allocation versus selection. In Proc. IEEE International Symposium on Information Theory (ISIT’06), pages 1234–1238, Seattle, WA, USA, July 2006. [Zar51] Kazimierz Zarankiewicz. Problem p 101. Colloquium Mathematicum, (2):301, 1951. [Zha88] Zhen Zhang. Partial converse for a relay channel. IEEE Transactions on Infor- mation Theory, 34(5):1106–1110, September 1988. [Zim80] Hubert Zimmermann. OSI Reference Model – The IS0 Model of Architecture for Open Systems Interconnection. IEEE Transactions on Communications, 28:425–432, April 1980. [ZT03] Lizhong Zheng and David N. C. Tse. Diversity and multiplexing: A fundamen- tal tradeoff in multiple-antenna channels. IEEE Transactions on Information Theory, 49(5):1073–1096, May 2003.

221